diff --git a/.openapi-generator/FILES b/.openapi-generator/FILES index f611d6f..5159a13 100644 --- a/.openapi-generator/FILES +++ b/.openapi-generator/FILES @@ -27,6 +27,11 @@ docs/AuthenticatorDuoStage.md docs/AuthenticatorDuoStageDeviceImportResponse.md docs/AuthenticatorDuoStageManualDeviceImportRequest.md docs/AuthenticatorDuoStageRequest.md +docs/AuthenticatorMobileChallenge.md +docs/AuthenticatorMobileChallengeResponseRequest.md +docs/AuthenticatorMobilePayloadChallenge.md +docs/AuthenticatorMobileStage.md +docs/AuthenticatorMobileStageRequest.md docs/AuthenticatorSMSChallenge.md docs/AuthenticatorSMSChallengeResponseRequest.md docs/AuthenticatorSMSStage.md @@ -161,6 +166,7 @@ docs/InvitationRequest.md docs/InvitationStage.md docs/InvitationStageRequest.md docs/IssuerModeEnum.md +docs/ItemMatchingModeEnum.md docs/KubernetesServiceConnection.md docs/KubernetesServiceConnectionRequest.md docs/LDAPAPIAccessMode.md @@ -183,6 +189,16 @@ docs/LoginMetrics.md docs/LoginSource.md docs/ManagedApi.md docs/Metadata.md +docs/MobileDevice.md +docs/MobileDeviceCheckInRequest.md +docs/MobileDeviceEnrollmentCallback.md +docs/MobileDeviceEnrollmentRequest.md +docs/MobileDeviceEnrollmentStatus.md +docs/MobileDeviceEnrollmentStatusStatusEnum.md +docs/MobileDeviceInfo.md +docs/MobileDeviceInfoRequest.md +docs/MobileDeviceRequest.md +docs/MobileDeviceResponseRequest.md docs/ModelEnum.md docs/ModelRequest.md docs/NameIdPolicyEnum.md @@ -219,6 +235,7 @@ docs/PaginatedApplicationList.md docs/PaginatedAuthenticateWebAuthnStageList.md docs/PaginatedAuthenticatedSessionList.md docs/PaginatedAuthenticatorDuoStageList.md +docs/PaginatedAuthenticatorMobileStageList.md docs/PaginatedAuthenticatorSMSStageList.md docs/PaginatedAuthenticatorStaticStageList.md docs/PaginatedAuthenticatorTOTPStageList.md @@ -254,6 +271,7 @@ docs/PaginatedLDAPPropertyMappingList.md docs/PaginatedLDAPProviderList.md docs/PaginatedLDAPSourceList.md docs/PaginatedLicenseList.md +docs/PaginatedMobileDeviceList.md docs/PaginatedNotificationList.md docs/PaginatedNotificationRuleList.md docs/PaginatedNotificationTransportList.md @@ -294,6 +312,7 @@ docs/PaginatedServiceConnectionList.md docs/PaginatedSourceList.md docs/PaginatedStageList.md docs/PaginatedStaticDeviceList.md +docs/PaginatedSystemTaskList.md docs/PaginatedTOTPDeviceList.md docs/PaginatedTenantList.md docs/PaginatedTokenList.md @@ -321,6 +340,7 @@ docs/PasswordStageRequest.md docs/PatchedApplicationRequest.md docs/PatchedAuthenticateWebAuthnStageRequest.md docs/PatchedAuthenticatorDuoStageRequest.md +docs/PatchedAuthenticatorMobileStageRequest.md docs/PatchedAuthenticatorSMSStageRequest.md docs/PatchedAuthenticatorStaticStageRequest.md docs/PatchedAuthenticatorTOTPStageRequest.md @@ -352,6 +372,7 @@ docs/PatchedLDAPPropertyMappingRequest.md docs/PatchedLDAPProviderRequest.md docs/PatchedLDAPSourceRequest.md docs/PatchedLicenseRequest.md +docs/PatchedMobileDeviceRequest.md docs/PatchedNotificationRequest.md docs/PatchedNotificationRuleRequest.md docs/PatchedNotificationTransportRequest.md @@ -396,6 +417,7 @@ docs/PatchedUserWriteStageRequest.md docs/PatchedWebAuthnDeviceRequest.md docs/Permission.md docs/PermissionAssignRequest.md +docs/PlatformEnum.md docs/PlexAuthenticationChallenge.md docs/PlexAuthenticationChallengeResponseRequest.md docs/PlexSource.md @@ -495,10 +517,10 @@ docs/StaticDeviceTokenRequest.md docs/SubModeEnum.md docs/SystemInfo.md docs/SystemInfoRuntime.md +docs/SystemTask.md +docs/SystemTaskStatusEnum.md docs/TOTPDevice.md docs/TOTPDeviceRequest.md -docs/Task.md -docs/TaskStatusEnum.md docs/Tenant.md docs/TenantAdminGroupRequestRequest.md docs/TenantRecoveryKeyRequestRequest.md @@ -626,6 +648,11 @@ src/main/kotlin/io/goauthentik/api/models/AuthenticatorDuoStage.kt src/main/kotlin/io/goauthentik/api/models/AuthenticatorDuoStageDeviceImportResponse.kt src/main/kotlin/io/goauthentik/api/models/AuthenticatorDuoStageManualDeviceImportRequest.kt src/main/kotlin/io/goauthentik/api/models/AuthenticatorDuoStageRequest.kt +src/main/kotlin/io/goauthentik/api/models/AuthenticatorMobileChallenge.kt +src/main/kotlin/io/goauthentik/api/models/AuthenticatorMobileChallengeResponseRequest.kt +src/main/kotlin/io/goauthentik/api/models/AuthenticatorMobilePayloadChallenge.kt +src/main/kotlin/io/goauthentik/api/models/AuthenticatorMobileStage.kt +src/main/kotlin/io/goauthentik/api/models/AuthenticatorMobileStageRequest.kt src/main/kotlin/io/goauthentik/api/models/AuthenticatorSMSChallenge.kt src/main/kotlin/io/goauthentik/api/models/AuthenticatorSMSChallengeResponseRequest.kt src/main/kotlin/io/goauthentik/api/models/AuthenticatorSMSStage.kt @@ -754,6 +781,7 @@ src/main/kotlin/io/goauthentik/api/models/InvitationRequest.kt src/main/kotlin/io/goauthentik/api/models/InvitationStage.kt src/main/kotlin/io/goauthentik/api/models/InvitationStageRequest.kt src/main/kotlin/io/goauthentik/api/models/IssuerModeEnum.kt +src/main/kotlin/io/goauthentik/api/models/ItemMatchingModeEnum.kt src/main/kotlin/io/goauthentik/api/models/KubernetesServiceConnection.kt src/main/kotlin/io/goauthentik/api/models/KubernetesServiceConnectionRequest.kt src/main/kotlin/io/goauthentik/api/models/LDAPAPIAccessMode.kt @@ -775,6 +803,16 @@ src/main/kotlin/io/goauthentik/api/models/LoginChallengeTypes.kt src/main/kotlin/io/goauthentik/api/models/LoginMetrics.kt src/main/kotlin/io/goauthentik/api/models/LoginSource.kt src/main/kotlin/io/goauthentik/api/models/Metadata.kt +src/main/kotlin/io/goauthentik/api/models/MobileDevice.kt +src/main/kotlin/io/goauthentik/api/models/MobileDeviceCheckInRequest.kt +src/main/kotlin/io/goauthentik/api/models/MobileDeviceEnrollmentCallback.kt +src/main/kotlin/io/goauthentik/api/models/MobileDeviceEnrollmentRequest.kt +src/main/kotlin/io/goauthentik/api/models/MobileDeviceEnrollmentStatus.kt +src/main/kotlin/io/goauthentik/api/models/MobileDeviceEnrollmentStatusStatusEnum.kt +src/main/kotlin/io/goauthentik/api/models/MobileDeviceInfo.kt +src/main/kotlin/io/goauthentik/api/models/MobileDeviceInfoRequest.kt +src/main/kotlin/io/goauthentik/api/models/MobileDeviceRequest.kt +src/main/kotlin/io/goauthentik/api/models/MobileDeviceResponseRequest.kt src/main/kotlin/io/goauthentik/api/models/ModelEnum.kt src/main/kotlin/io/goauthentik/api/models/ModelRequest.kt src/main/kotlin/io/goauthentik/api/models/NameIdPolicyEnum.kt @@ -809,6 +847,7 @@ src/main/kotlin/io/goauthentik/api/models/PaginatedApplicationList.kt src/main/kotlin/io/goauthentik/api/models/PaginatedAuthenticateWebAuthnStageList.kt src/main/kotlin/io/goauthentik/api/models/PaginatedAuthenticatedSessionList.kt src/main/kotlin/io/goauthentik/api/models/PaginatedAuthenticatorDuoStageList.kt +src/main/kotlin/io/goauthentik/api/models/PaginatedAuthenticatorMobileStageList.kt src/main/kotlin/io/goauthentik/api/models/PaginatedAuthenticatorSMSStageList.kt src/main/kotlin/io/goauthentik/api/models/PaginatedAuthenticatorStaticStageList.kt src/main/kotlin/io/goauthentik/api/models/PaginatedAuthenticatorTOTPStageList.kt @@ -844,6 +883,7 @@ src/main/kotlin/io/goauthentik/api/models/PaginatedLDAPPropertyMappingList.kt src/main/kotlin/io/goauthentik/api/models/PaginatedLDAPProviderList.kt src/main/kotlin/io/goauthentik/api/models/PaginatedLDAPSourceList.kt src/main/kotlin/io/goauthentik/api/models/PaginatedLicenseList.kt +src/main/kotlin/io/goauthentik/api/models/PaginatedMobileDeviceList.kt src/main/kotlin/io/goauthentik/api/models/PaginatedNotificationList.kt src/main/kotlin/io/goauthentik/api/models/PaginatedNotificationRuleList.kt src/main/kotlin/io/goauthentik/api/models/PaginatedNotificationTransportList.kt @@ -884,6 +924,7 @@ src/main/kotlin/io/goauthentik/api/models/PaginatedServiceConnectionList.kt src/main/kotlin/io/goauthentik/api/models/PaginatedSourceList.kt src/main/kotlin/io/goauthentik/api/models/PaginatedStageList.kt src/main/kotlin/io/goauthentik/api/models/PaginatedStaticDeviceList.kt +src/main/kotlin/io/goauthentik/api/models/PaginatedSystemTaskList.kt src/main/kotlin/io/goauthentik/api/models/PaginatedTOTPDeviceList.kt src/main/kotlin/io/goauthentik/api/models/PaginatedTenantList.kt src/main/kotlin/io/goauthentik/api/models/PaginatedTokenList.kt @@ -911,6 +952,7 @@ src/main/kotlin/io/goauthentik/api/models/PasswordStageRequest.kt src/main/kotlin/io/goauthentik/api/models/PatchedApplicationRequest.kt src/main/kotlin/io/goauthentik/api/models/PatchedAuthenticateWebAuthnStageRequest.kt src/main/kotlin/io/goauthentik/api/models/PatchedAuthenticatorDuoStageRequest.kt +src/main/kotlin/io/goauthentik/api/models/PatchedAuthenticatorMobileStageRequest.kt src/main/kotlin/io/goauthentik/api/models/PatchedAuthenticatorSMSStageRequest.kt src/main/kotlin/io/goauthentik/api/models/PatchedAuthenticatorStaticStageRequest.kt src/main/kotlin/io/goauthentik/api/models/PatchedAuthenticatorTOTPStageRequest.kt @@ -942,6 +984,7 @@ src/main/kotlin/io/goauthentik/api/models/PatchedLDAPPropertyMappingRequest.kt src/main/kotlin/io/goauthentik/api/models/PatchedLDAPProviderRequest.kt src/main/kotlin/io/goauthentik/api/models/PatchedLDAPSourceRequest.kt src/main/kotlin/io/goauthentik/api/models/PatchedLicenseRequest.kt +src/main/kotlin/io/goauthentik/api/models/PatchedMobileDeviceRequest.kt src/main/kotlin/io/goauthentik/api/models/PatchedNotificationRequest.kt src/main/kotlin/io/goauthentik/api/models/PatchedNotificationRuleRequest.kt src/main/kotlin/io/goauthentik/api/models/PatchedNotificationTransportRequest.kt @@ -986,6 +1029,7 @@ src/main/kotlin/io/goauthentik/api/models/PatchedUserWriteStageRequest.kt src/main/kotlin/io/goauthentik/api/models/PatchedWebAuthnDeviceRequest.kt src/main/kotlin/io/goauthentik/api/models/Permission.kt src/main/kotlin/io/goauthentik/api/models/PermissionAssignRequest.kt +src/main/kotlin/io/goauthentik/api/models/PlatformEnum.kt src/main/kotlin/io/goauthentik/api/models/PlexAuthenticationChallenge.kt src/main/kotlin/io/goauthentik/api/models/PlexAuthenticationChallengeResponseRequest.kt src/main/kotlin/io/goauthentik/api/models/PlexSource.kt @@ -1076,10 +1120,10 @@ src/main/kotlin/io/goauthentik/api/models/StaticDeviceTokenRequest.kt src/main/kotlin/io/goauthentik/api/models/SubModeEnum.kt src/main/kotlin/io/goauthentik/api/models/SystemInfo.kt src/main/kotlin/io/goauthentik/api/models/SystemInfoRuntime.kt +src/main/kotlin/io/goauthentik/api/models/SystemTask.kt +src/main/kotlin/io/goauthentik/api/models/SystemTaskStatusEnum.kt src/main/kotlin/io/goauthentik/api/models/TOTPDevice.kt src/main/kotlin/io/goauthentik/api/models/TOTPDeviceRequest.kt -src/main/kotlin/io/goauthentik/api/models/Task.kt -src/main/kotlin/io/goauthentik/api/models/TaskStatusEnum.kt src/main/kotlin/io/goauthentik/api/models/Tenant.kt src/main/kotlin/io/goauthentik/api/models/TenantAdminGroupRequestRequest.kt src/main/kotlin/io/goauthentik/api/models/TenantRecoveryKeyRequestRequest.kt diff --git a/README.md b/README.md index eff891a..705541b 100644 --- a/README.md +++ b/README.md @@ -14,7 +14,7 @@ This repo contains a generated API client to talk with authentik's API from Kotl ## Overview This API client was generated by the [OpenAPI Generator](https://openapi-generator.tech) project. By using the [OpenAPI-spec](https://www.openapis.org/) from a remote server, you can easily generate an API client. -- API version: 2023.10.6 +- API version: 2023.10.7 - Package version: ## Documentation for API Endpoints @@ -31,9 +31,6 @@ Class | Method | HTTP request | Description *AdminApi* | [**adminSettingsUpdate**](docs/AdminApi.md#adminsettingsupdate) | **PUT** /admin/settings/ | *AdminApi* | [**adminSystemCreate**](docs/AdminApi.md#adminsystemcreate) | **POST** /admin/system/ | *AdminApi* | [**adminSystemRetrieve**](docs/AdminApi.md#adminsystemretrieve) | **GET** /admin/system/ | -*AdminApi* | [**adminSystemTasksList**](docs/AdminApi.md#adminsystemtaskslist) | **GET** /admin/system_tasks/ | -*AdminApi* | [**adminSystemTasksRetrieve**](docs/AdminApi.md#adminsystemtasksretrieve) | **GET** /admin/system_tasks/{id}/ | -*AdminApi* | [**adminSystemTasksRetryCreate**](docs/AdminApi.md#adminsystemtasksretrycreate) | **POST** /admin/system_tasks/{id}/retry/ | *AdminApi* | [**adminVersionRetrieve**](docs/AdminApi.md#adminversionretrieve) | **GET** /admin/version/ | *AdminApi* | [**adminWorkersRetrieve**](docs/AdminApi.md#adminworkersretrieve) | **GET** /admin/workers/ | *AuthenticatorsApi* | [**authenticatorsAdminAllList**](docs/AuthenticatorsApi.md#authenticatorsadminalllist) | **GET** /authenticators/admin/all/ | @@ -43,6 +40,12 @@ Class | Method | HTTP request | Description *AuthenticatorsApi* | [**authenticatorsAdminDuoPartialUpdate**](docs/AuthenticatorsApi.md#authenticatorsadminduopartialupdate) | **PATCH** /authenticators/admin/duo/{id}/ | *AuthenticatorsApi* | [**authenticatorsAdminDuoRetrieve**](docs/AuthenticatorsApi.md#authenticatorsadminduoretrieve) | **GET** /authenticators/admin/duo/{id}/ | *AuthenticatorsApi* | [**authenticatorsAdminDuoUpdate**](docs/AuthenticatorsApi.md#authenticatorsadminduoupdate) | **PUT** /authenticators/admin/duo/{id}/ | +*AuthenticatorsApi* | [**authenticatorsAdminMobileCreate**](docs/AuthenticatorsApi.md#authenticatorsadminmobilecreate) | **POST** /authenticators/admin/mobile/ | +*AuthenticatorsApi* | [**authenticatorsAdminMobileDestroy**](docs/AuthenticatorsApi.md#authenticatorsadminmobiledestroy) | **DELETE** /authenticators/admin/mobile/{uuid}/ | +*AuthenticatorsApi* | [**authenticatorsAdminMobileList**](docs/AuthenticatorsApi.md#authenticatorsadminmobilelist) | **GET** /authenticators/admin/mobile/ | +*AuthenticatorsApi* | [**authenticatorsAdminMobilePartialUpdate**](docs/AuthenticatorsApi.md#authenticatorsadminmobilepartialupdate) | **PATCH** /authenticators/admin/mobile/{uuid}/ | +*AuthenticatorsApi* | [**authenticatorsAdminMobileRetrieve**](docs/AuthenticatorsApi.md#authenticatorsadminmobileretrieve) | **GET** /authenticators/admin/mobile/{uuid}/ | +*AuthenticatorsApi* | [**authenticatorsAdminMobileUpdate**](docs/AuthenticatorsApi.md#authenticatorsadminmobileupdate) | **PUT** /authenticators/admin/mobile/{uuid}/ | *AuthenticatorsApi* | [**authenticatorsAdminSmsCreate**](docs/AuthenticatorsApi.md#authenticatorsadminsmscreate) | **POST** /authenticators/admin/sms/ | *AuthenticatorsApi* | [**authenticatorsAdminSmsDestroy**](docs/AuthenticatorsApi.md#authenticatorsadminsmsdestroy) | **DELETE** /authenticators/admin/sms/{id}/ | *AuthenticatorsApi* | [**authenticatorsAdminSmsList**](docs/AuthenticatorsApi.md#authenticatorsadminsmslist) | **GET** /authenticators/admin/sms/ | @@ -74,6 +77,16 @@ Class | Method | HTTP request | Description *AuthenticatorsApi* | [**authenticatorsDuoRetrieve**](docs/AuthenticatorsApi.md#authenticatorsduoretrieve) | **GET** /authenticators/duo/{id}/ | *AuthenticatorsApi* | [**authenticatorsDuoUpdate**](docs/AuthenticatorsApi.md#authenticatorsduoupdate) | **PUT** /authenticators/duo/{id}/ | *AuthenticatorsApi* | [**authenticatorsDuoUsedByList**](docs/AuthenticatorsApi.md#authenticatorsduousedbylist) | **GET** /authenticators/duo/{id}/used_by/ | +*AuthenticatorsApi* | [**authenticatorsMobileCheckInCreate**](docs/AuthenticatorsApi.md#authenticatorsmobilecheckincreate) | **POST** /authenticators/mobile/{uuid}/check_in/ | +*AuthenticatorsApi* | [**authenticatorsMobileDestroy**](docs/AuthenticatorsApi.md#authenticatorsmobiledestroy) | **DELETE** /authenticators/mobile/{uuid}/ | +*AuthenticatorsApi* | [**authenticatorsMobileEnrollmentCallbackCreate**](docs/AuthenticatorsApi.md#authenticatorsmobileenrollmentcallbackcreate) | **POST** /authenticators/mobile/{uuid}/enrollment_callback/ | +*AuthenticatorsApi* | [**authenticatorsMobileEnrollmentStatusCreate**](docs/AuthenticatorsApi.md#authenticatorsmobileenrollmentstatuscreate) | **POST** /authenticators/mobile/{uuid}/enrollment_status/ | +*AuthenticatorsApi* | [**authenticatorsMobileList**](docs/AuthenticatorsApi.md#authenticatorsmobilelist) | **GET** /authenticators/mobile/ | +*AuthenticatorsApi* | [**authenticatorsMobilePartialUpdate**](docs/AuthenticatorsApi.md#authenticatorsmobilepartialupdate) | **PATCH** /authenticators/mobile/{uuid}/ | +*AuthenticatorsApi* | [**authenticatorsMobileReceiveResponseCreate**](docs/AuthenticatorsApi.md#authenticatorsmobilereceiveresponsecreate) | **POST** /authenticators/mobile/{uuid}/receive_response/ | +*AuthenticatorsApi* | [**authenticatorsMobileRetrieve**](docs/AuthenticatorsApi.md#authenticatorsmobileretrieve) | **GET** /authenticators/mobile/{uuid}/ | +*AuthenticatorsApi* | [**authenticatorsMobileUpdate**](docs/AuthenticatorsApi.md#authenticatorsmobileupdate) | **PUT** /authenticators/mobile/{uuid}/ | +*AuthenticatorsApi* | [**authenticatorsMobileUsedByList**](docs/AuthenticatorsApi.md#authenticatorsmobileusedbylist) | **GET** /authenticators/mobile/{uuid}/used_by/ | *AuthenticatorsApi* | [**authenticatorsSmsDestroy**](docs/AuthenticatorsApi.md#authenticatorssmsdestroy) | **DELETE** /authenticators/sms/{id}/ | *AuthenticatorsApi* | [**authenticatorsSmsList**](docs/AuthenticatorsApi.md#authenticatorssmslist) | **GET** /authenticators/sms/ | *AuthenticatorsApi* | [**authenticatorsSmsPartialUpdate**](docs/AuthenticatorsApi.md#authenticatorssmspartialupdate) | **PATCH** /authenticators/sms/{id}/ | @@ -204,6 +217,9 @@ Class | Method | HTTP request | Description *EventsApi* | [**eventsRulesRetrieve**](docs/EventsApi.md#eventsrulesretrieve) | **GET** /events/rules/{pbm_uuid}/ | *EventsApi* | [**eventsRulesUpdate**](docs/EventsApi.md#eventsrulesupdate) | **PUT** /events/rules/{pbm_uuid}/ | *EventsApi* | [**eventsRulesUsedByList**](docs/EventsApi.md#eventsrulesusedbylist) | **GET** /events/rules/{pbm_uuid}/used_by/ | +*EventsApi* | [**eventsSystemTasksList**](docs/EventsApi.md#eventssystemtaskslist) | **GET** /events/system_tasks/ | +*EventsApi* | [**eventsSystemTasksRetrieve**](docs/EventsApi.md#eventssystemtasksretrieve) | **GET** /events/system_tasks/{uuid}/ | +*EventsApi* | [**eventsSystemTasksRunCreate**](docs/EventsApi.md#eventssystemtasksruncreate) | **POST** /events/system_tasks/{uuid}/run/ | *EventsApi* | [**eventsTransportsCreate**](docs/EventsApi.md#eventstransportscreate) | **POST** /events/transports/ | *EventsApi* | [**eventsTransportsDestroy**](docs/EventsApi.md#eventstransportsdestroy) | **DELETE** /events/transports/{uuid}/ | *EventsApi* | [**eventsTransportsList**](docs/EventsApi.md#eventstransportslist) | **GET** /events/transports/ | @@ -573,6 +589,13 @@ Class | Method | HTTP request | Description *StagesApi* | [**stagesAuthenticatorDuoRetrieve**](docs/StagesApi.md#stagesauthenticatorduoretrieve) | **GET** /stages/authenticator/duo/{stage_uuid}/ | *StagesApi* | [**stagesAuthenticatorDuoUpdate**](docs/StagesApi.md#stagesauthenticatorduoupdate) | **PUT** /stages/authenticator/duo/{stage_uuid}/ | *StagesApi* | [**stagesAuthenticatorDuoUsedByList**](docs/StagesApi.md#stagesauthenticatorduousedbylist) | **GET** /stages/authenticator/duo/{stage_uuid}/used_by/ | +*StagesApi* | [**stagesAuthenticatorMobileCreate**](docs/StagesApi.md#stagesauthenticatormobilecreate) | **POST** /stages/authenticator/mobile/ | +*StagesApi* | [**stagesAuthenticatorMobileDestroy**](docs/StagesApi.md#stagesauthenticatormobiledestroy) | **DELETE** /stages/authenticator/mobile/{stage_uuid}/ | +*StagesApi* | [**stagesAuthenticatorMobileList**](docs/StagesApi.md#stagesauthenticatormobilelist) | **GET** /stages/authenticator/mobile/ | +*StagesApi* | [**stagesAuthenticatorMobilePartialUpdate**](docs/StagesApi.md#stagesauthenticatormobilepartialupdate) | **PATCH** /stages/authenticator/mobile/{stage_uuid}/ | +*StagesApi* | [**stagesAuthenticatorMobileRetrieve**](docs/StagesApi.md#stagesauthenticatormobileretrieve) | **GET** /stages/authenticator/mobile/{stage_uuid}/ | +*StagesApi* | [**stagesAuthenticatorMobileUpdate**](docs/StagesApi.md#stagesauthenticatormobileupdate) | **PUT** /stages/authenticator/mobile/{stage_uuid}/ | +*StagesApi* | [**stagesAuthenticatorMobileUsedByList**](docs/StagesApi.md#stagesauthenticatormobileusedbylist) | **GET** /stages/authenticator/mobile/{stage_uuid}/used_by/ | *StagesApi* | [**stagesAuthenticatorSmsCreate**](docs/StagesApi.md#stagesauthenticatorsmscreate) | **POST** /stages/authenticator/sms/ | *StagesApi* | [**stagesAuthenticatorSmsDestroy**](docs/StagesApi.md#stagesauthenticatorsmsdestroy) | **DELETE** /stages/authenticator/sms/{stage_uuid}/ | *StagesApi* | [**stagesAuthenticatorSmsList**](docs/StagesApi.md#stagesauthenticatorsmslist) | **GET** /stages/authenticator/sms/ | @@ -759,6 +782,11 @@ Class | Method | HTTP request | Description - [AuthenticatorDuoStageDeviceImportResponse](docs/AuthenticatorDuoStageDeviceImportResponse.md) - [AuthenticatorDuoStageManualDeviceImportRequest](docs/AuthenticatorDuoStageManualDeviceImportRequest.md) - [AuthenticatorDuoStageRequest](docs/AuthenticatorDuoStageRequest.md) + - [AuthenticatorMobileChallenge](docs/AuthenticatorMobileChallenge.md) + - [AuthenticatorMobileChallengeResponseRequest](docs/AuthenticatorMobileChallengeResponseRequest.md) + - [AuthenticatorMobilePayloadChallenge](docs/AuthenticatorMobilePayloadChallenge.md) + - [AuthenticatorMobileStage](docs/AuthenticatorMobileStage.md) + - [AuthenticatorMobileStageRequest](docs/AuthenticatorMobileStageRequest.md) - [AuthenticatorSMSChallenge](docs/AuthenticatorSMSChallenge.md) - [AuthenticatorSMSChallengeResponseRequest](docs/AuthenticatorSMSChallengeResponseRequest.md) - [AuthenticatorSMSStage](docs/AuthenticatorSMSStage.md) @@ -887,6 +915,7 @@ Class | Method | HTTP request | Description - [InvitationStage](docs/InvitationStage.md) - [InvitationStageRequest](docs/InvitationStageRequest.md) - [IssuerModeEnum](docs/IssuerModeEnum.md) + - [ItemMatchingModeEnum](docs/ItemMatchingModeEnum.md) - [KubernetesServiceConnection](docs/KubernetesServiceConnection.md) - [KubernetesServiceConnectionRequest](docs/KubernetesServiceConnectionRequest.md) - [LDAPAPIAccessMode](docs/LDAPAPIAccessMode.md) @@ -908,6 +937,16 @@ Class | Method | HTTP request | Description - [LoginMetrics](docs/LoginMetrics.md) - [LoginSource](docs/LoginSource.md) - [Metadata](docs/Metadata.md) + - [MobileDevice](docs/MobileDevice.md) + - [MobileDeviceCheckInRequest](docs/MobileDeviceCheckInRequest.md) + - [MobileDeviceEnrollmentCallback](docs/MobileDeviceEnrollmentCallback.md) + - [MobileDeviceEnrollmentRequest](docs/MobileDeviceEnrollmentRequest.md) + - [MobileDeviceEnrollmentStatus](docs/MobileDeviceEnrollmentStatus.md) + - [MobileDeviceEnrollmentStatusStatusEnum](docs/MobileDeviceEnrollmentStatusStatusEnum.md) + - [MobileDeviceInfo](docs/MobileDeviceInfo.md) + - [MobileDeviceInfoRequest](docs/MobileDeviceInfoRequest.md) + - [MobileDeviceRequest](docs/MobileDeviceRequest.md) + - [MobileDeviceResponseRequest](docs/MobileDeviceResponseRequest.md) - [ModelEnum](docs/ModelEnum.md) - [ModelRequest](docs/ModelRequest.md) - [NameIdPolicyEnum](docs/NameIdPolicyEnum.md) @@ -942,6 +981,7 @@ Class | Method | HTTP request | Description - [PaginatedAuthenticateWebAuthnStageList](docs/PaginatedAuthenticateWebAuthnStageList.md) - [PaginatedAuthenticatedSessionList](docs/PaginatedAuthenticatedSessionList.md) - [PaginatedAuthenticatorDuoStageList](docs/PaginatedAuthenticatorDuoStageList.md) + - [PaginatedAuthenticatorMobileStageList](docs/PaginatedAuthenticatorMobileStageList.md) - [PaginatedAuthenticatorSMSStageList](docs/PaginatedAuthenticatorSMSStageList.md) - [PaginatedAuthenticatorStaticStageList](docs/PaginatedAuthenticatorStaticStageList.md) - [PaginatedAuthenticatorTOTPStageList](docs/PaginatedAuthenticatorTOTPStageList.md) @@ -977,6 +1017,7 @@ Class | Method | HTTP request | Description - [PaginatedLDAPProviderList](docs/PaginatedLDAPProviderList.md) - [PaginatedLDAPSourceList](docs/PaginatedLDAPSourceList.md) - [PaginatedLicenseList](docs/PaginatedLicenseList.md) + - [PaginatedMobileDeviceList](docs/PaginatedMobileDeviceList.md) - [PaginatedNotificationList](docs/PaginatedNotificationList.md) - [PaginatedNotificationRuleList](docs/PaginatedNotificationRuleList.md) - [PaginatedNotificationTransportList](docs/PaginatedNotificationTransportList.md) @@ -1017,6 +1058,7 @@ Class | Method | HTTP request | Description - [PaginatedSourceList](docs/PaginatedSourceList.md) - [PaginatedStageList](docs/PaginatedStageList.md) - [PaginatedStaticDeviceList](docs/PaginatedStaticDeviceList.md) + - [PaginatedSystemTaskList](docs/PaginatedSystemTaskList.md) - [PaginatedTOTPDeviceList](docs/PaginatedTOTPDeviceList.md) - [PaginatedTenantList](docs/PaginatedTenantList.md) - [PaginatedTokenList](docs/PaginatedTokenList.md) @@ -1044,6 +1086,7 @@ Class | Method | HTTP request | Description - [PatchedApplicationRequest](docs/PatchedApplicationRequest.md) - [PatchedAuthenticateWebAuthnStageRequest](docs/PatchedAuthenticateWebAuthnStageRequest.md) - [PatchedAuthenticatorDuoStageRequest](docs/PatchedAuthenticatorDuoStageRequest.md) + - [PatchedAuthenticatorMobileStageRequest](docs/PatchedAuthenticatorMobileStageRequest.md) - [PatchedAuthenticatorSMSStageRequest](docs/PatchedAuthenticatorSMSStageRequest.md) - [PatchedAuthenticatorStaticStageRequest](docs/PatchedAuthenticatorStaticStageRequest.md) - [PatchedAuthenticatorTOTPStageRequest](docs/PatchedAuthenticatorTOTPStageRequest.md) @@ -1075,6 +1118,7 @@ Class | Method | HTTP request | Description - [PatchedLDAPProviderRequest](docs/PatchedLDAPProviderRequest.md) - [PatchedLDAPSourceRequest](docs/PatchedLDAPSourceRequest.md) - [PatchedLicenseRequest](docs/PatchedLicenseRequest.md) + - [PatchedMobileDeviceRequest](docs/PatchedMobileDeviceRequest.md) - [PatchedNotificationRequest](docs/PatchedNotificationRequest.md) - [PatchedNotificationRuleRequest](docs/PatchedNotificationRuleRequest.md) - [PatchedNotificationTransportRequest](docs/PatchedNotificationTransportRequest.md) @@ -1119,6 +1163,7 @@ Class | Method | HTTP request | Description - [PatchedWebAuthnDeviceRequest](docs/PatchedWebAuthnDeviceRequest.md) - [Permission](docs/Permission.md) - [PermissionAssignRequest](docs/PermissionAssignRequest.md) + - [PlatformEnum](docs/PlatformEnum.md) - [PlexAuthenticationChallenge](docs/PlexAuthenticationChallenge.md) - [PlexAuthenticationChallengeResponseRequest](docs/PlexAuthenticationChallengeResponseRequest.md) - [PlexSource](docs/PlexSource.md) @@ -1209,10 +1254,10 @@ Class | Method | HTTP request | Description - [SubModeEnum](docs/SubModeEnum.md) - [SystemInfo](docs/SystemInfo.md) - [SystemInfoRuntime](docs/SystemInfoRuntime.md) + - [SystemTask](docs/SystemTask.md) + - [SystemTaskStatusEnum](docs/SystemTaskStatusEnum.md) - [TOTPDevice](docs/TOTPDevice.md) - [TOTPDeviceRequest](docs/TOTPDeviceRequest.md) - - [Task](docs/Task.md) - - [TaskStatusEnum](docs/TaskStatusEnum.md) - [Tenant](docs/Tenant.md) - [TenantAdminGroupRequestRequest](docs/TenantAdminGroupRequestRequest.md) - [TenantRecoveryKeyRequestRequest](docs/TenantRecoveryKeyRequestRequest.md) @@ -1285,6 +1330,15 @@ Class | Method | HTTP request | Description Note, each API key must be added to a map of `map[string]APIKey` where the key is: Authorization and passed in as the auth context for each request. +### mobile_device_token + +- **Type**: API key +- **API key parameter name**: Authorization +- **Location**: HTTP header + +Note, each API key must be added to a map of `map[string]APIKey` where the key is: Authorization and passed in as the auth context for each request. + + ## Documentation for Utility Methods Due to the fact that model structure members are all pointers, this package contains diff --git a/build.gradle b/build.gradle index fe709a9..2a48c5c 100644 --- a/build.gradle +++ b/build.gradle @@ -1,4 +1,5 @@ group 'io.goauthentik' +version '1.0.0' wrapper { gradleVersion = '7.5' diff --git a/docs/AdminApi.md b/docs/AdminApi.md index c04b8ca..3910698 100644 --- a/docs/AdminApi.md +++ b/docs/AdminApi.md @@ -12,9 +12,6 @@ Method | HTTP request | Description [**adminSettingsUpdate**](AdminApi.md#adminSettingsUpdate) | **PUT** /admin/settings/ | [**adminSystemCreate**](AdminApi.md#adminSystemCreate) | **POST** /admin/system/ | [**adminSystemRetrieve**](AdminApi.md#adminSystemRetrieve) | **GET** /admin/system/ | -[**adminSystemTasksList**](AdminApi.md#adminSystemTasksList) | **GET** /admin/system_tasks/ | -[**adminSystemTasksRetrieve**](AdminApi.md#adminSystemTasksRetrieve) | **GET** /admin/system_tasks/{id}/ | -[**adminSystemTasksRetryCreate**](AdminApi.md#adminSystemTasksRetryCreate) | **POST** /admin/system_tasks/{id}/retry/ | [**adminVersionRetrieve**](AdminApi.md#adminVersionRetrieve) | **GET** /admin/version/ | [**adminWorkersRetrieve**](AdminApi.md#adminWorkersRetrieve) | **GET** /admin/workers/ | @@ -386,151 +383,6 @@ This endpoint does not need any parameter. ### Authorization -Configure authentik: - ApiClient.apiKey["Authorization"] = "" - ApiClient.apiKeyPrefix["Authorization"] = "" - -### HTTP request headers - - - **Content-Type**: Not defined - - **Accept**: application/json - - -# **adminSystemTasksList** -> kotlin.collections.List<Task> adminSystemTasksList() - - - -List system tasks - -### Example -```kotlin -// Import classes: -//import io.goauthentik.api.infrastructure.* -//import io.goauthentik.api.models.* - -val apiInstance = AdminApi() -try { - val result : kotlin.collections.List = apiInstance.adminSystemTasksList() - println(result) -} catch (e: ClientException) { - println("4xx response calling AdminApi#adminSystemTasksList") - e.printStackTrace() -} catch (e: ServerException) { - println("5xx response calling AdminApi#adminSystemTasksList") - e.printStackTrace() -} -``` - -### Parameters -This endpoint does not need any parameter. - -### Return type - -[**kotlin.collections.List<Task>**](Task.md) - -### Authorization - - -Configure authentik: - ApiClient.apiKey["Authorization"] = "" - ApiClient.apiKeyPrefix["Authorization"] = "" - -### HTTP request headers - - - **Content-Type**: Not defined - - **Accept**: application/json - - -# **adminSystemTasksRetrieve** -> Task adminSystemTasksRetrieve(id) - - - -Get a single system task - -### Example -```kotlin -// Import classes: -//import io.goauthentik.api.infrastructure.* -//import io.goauthentik.api.models.* - -val apiInstance = AdminApi() -val id : kotlin.String = id_example // kotlin.String | -try { - val result : Task = apiInstance.adminSystemTasksRetrieve(id) - println(result) -} catch (e: ClientException) { - println("4xx response calling AdminApi#adminSystemTasksRetrieve") - e.printStackTrace() -} catch (e: ServerException) { - println("5xx response calling AdminApi#adminSystemTasksRetrieve") - e.printStackTrace() -} -``` - -### Parameters - -Name | Type | Description | Notes -------------- | ------------- | ------------- | ------------- - **id** | **kotlin.String**| | - -### Return type - -[**Task**](Task.md) - -### Authorization - - -Configure authentik: - ApiClient.apiKey["Authorization"] = "" - ApiClient.apiKeyPrefix["Authorization"] = "" - -### HTTP request headers - - - **Content-Type**: Not defined - - **Accept**: application/json - - -# **adminSystemTasksRetryCreate** -> adminSystemTasksRetryCreate(id) - - - -Retry task - -### Example -```kotlin -// Import classes: -//import io.goauthentik.api.infrastructure.* -//import io.goauthentik.api.models.* - -val apiInstance = AdminApi() -val id : kotlin.String = id_example // kotlin.String | -try { - apiInstance.adminSystemTasksRetryCreate(id) -} catch (e: ClientException) { - println("4xx response calling AdminApi#adminSystemTasksRetryCreate") - e.printStackTrace() -} catch (e: ServerException) { - println("5xx response calling AdminApi#adminSystemTasksRetryCreate") - e.printStackTrace() -} -``` - -### Parameters - -Name | Type | Description | Notes -------------- | ------------- | ------------- | ------------- - **id** | **kotlin.String**| | - -### Return type - -null (empty response body) - -### Authorization - - Configure authentik: ApiClient.apiKey["Authorization"] = "" ApiClient.apiKeyPrefix["Authorization"] = "" diff --git a/docs/AppEnum.md b/docs/AppEnum.md index ed448ec..580d941 100644 --- a/docs/AppEnum.md +++ b/docs/AppEnum.md @@ -60,6 +60,8 @@ * `stagesPeriodAuthenticatorDuo` (value: `"authentik.stages.authenticator_duo"`) + * `stagesPeriodAuthenticatorMobile` (value: `"authentik.stages.authenticator_mobile"`) + * `stagesPeriodAuthenticatorSms` (value: `"authentik.stages.authenticator_sms"`) * `stagesPeriodAuthenticatorStatic` (value: `"authentik.stages.authenticator_static"`) diff --git a/docs/AuthenticatorMobileChallenge.md b/docs/AuthenticatorMobileChallenge.md new file mode 100644 index 0000000..9933e2f --- /dev/null +++ b/docs/AuthenticatorMobileChallenge.md @@ -0,0 +1,16 @@ + +# AuthenticatorMobileChallenge + +## Properties +Name | Type | Description | Notes +------------ | ------------- | ------------- | ------------- +**type** | [**ChallengeChoices**](ChallengeChoices.md) | | +**pendingUser** | **kotlin.String** | | +**pendingUserAvatar** | **kotlin.String** | | +**payload** | [**AuthenticatorMobilePayloadChallenge**](AuthenticatorMobilePayloadChallenge.md) | | +**flowInfo** | [**ContextualFlowInfo**](ContextualFlowInfo.md) | | [optional] +**component** | **kotlin.String** | | [optional] +**responseErrors** | **kotlin.collections.Map<kotlin.String, kotlin.collections.List<ErrorDetail>>** | | [optional] + + + diff --git a/docs/AuthenticatorMobileChallengeResponseRequest.md b/docs/AuthenticatorMobileChallengeResponseRequest.md new file mode 100644 index 0000000..1d4b685 --- /dev/null +++ b/docs/AuthenticatorMobileChallengeResponseRequest.md @@ -0,0 +1,10 @@ + +# AuthenticatorMobileChallengeResponseRequest + +## Properties +Name | Type | Description | Notes +------------ | ------------- | ------------- | ------------- +**component** | **kotlin.String** | | [optional] + + + diff --git a/docs/AuthenticatorMobilePayloadChallenge.md b/docs/AuthenticatorMobilePayloadChallenge.md new file mode 100644 index 0000000..7b8490c --- /dev/null +++ b/docs/AuthenticatorMobilePayloadChallenge.md @@ -0,0 +1,12 @@ + +# AuthenticatorMobilePayloadChallenge + +## Properties +Name | Type | Description | Notes +------------ | ------------- | ------------- | ------------- +**u** | **kotlin.String** | Server URL | [optional] +**s** | **kotlin.String** | Stage UUID | [optional] +**t** | **kotlin.String** | Initial Token | [optional] + + + diff --git a/docs/AuthenticatorMobileStage.md b/docs/AuthenticatorMobileStage.md new file mode 100644 index 0000000..921d533 --- /dev/null +++ b/docs/AuthenticatorMobileStage.md @@ -0,0 +1,20 @@ + +# AuthenticatorMobileStage + +## Properties +Name | Type | Description | Notes +------------ | ------------- | ------------- | ------------- +**pk** | [**java.util.UUID**](java.util.UUID.md) | | [readonly] +**name** | **kotlin.String** | | +**component** | **kotlin.String** | Get object type so that we know how to edit the object | [readonly] +**verboseName** | **kotlin.String** | Return object's verbose_name | [readonly] +**verboseNamePlural** | **kotlin.String** | Return object's plural verbose_name | [readonly] +**metaModelName** | **kotlin.String** | Return internal model name | [readonly] +**cgwEndpoint** | **kotlin.String** | | +**flowSet** | [**kotlin.collections.List<FlowSet>**](FlowSet.md) | | [optional] +**configureFlow** | [**java.util.UUID**](java.util.UUID.md) | Flow used by an authenticated user to configure this Stage. If empty, user will not be able to configure this stage. | [optional] +**friendlyName** | **kotlin.String** | | [optional] +**itemMatchingMode** | [**ItemMatchingModeEnum**](ItemMatchingModeEnum.md) | | [optional] + + + diff --git a/docs/AuthenticatorMobileStageRequest.md b/docs/AuthenticatorMobileStageRequest.md new file mode 100644 index 0000000..45faf18 --- /dev/null +++ b/docs/AuthenticatorMobileStageRequest.md @@ -0,0 +1,15 @@ + +# AuthenticatorMobileStageRequest + +## Properties +Name | Type | Description | Notes +------------ | ------------- | ------------- | ------------- +**name** | **kotlin.String** | | +**cgwEndpoint** | **kotlin.String** | | +**flowSet** | [**kotlin.collections.List<FlowSetRequest>**](FlowSetRequest.md) | | [optional] +**configureFlow** | [**java.util.UUID**](java.util.UUID.md) | Flow used by an authenticated user to configure this Stage. If empty, user will not be able to configure this stage. | [optional] +**friendlyName** | **kotlin.String** | | [optional] +**itemMatchingMode** | [**ItemMatchingModeEnum**](ItemMatchingModeEnum.md) | | [optional] + + + diff --git a/docs/AuthenticatorValidationChallengeResponseRequest.md b/docs/AuthenticatorValidationChallengeResponseRequest.md index baf071d..768b99c 100644 --- a/docs/AuthenticatorValidationChallengeResponseRequest.md +++ b/docs/AuthenticatorValidationChallengeResponseRequest.md @@ -10,6 +10,7 @@ Name | Type | Description | Notes **code** | **kotlin.String** | | [optional] **webauthn** | [**kotlin.collections.Map<kotlin.String, kotlin.Any>**](kotlin.Any.md) | | [optional] **duo** | **kotlin.Int** | | [optional] +**mobile** | **kotlin.String** | | [optional] diff --git a/docs/AuthenticatorsApi.md b/docs/AuthenticatorsApi.md index d9536ad..0386998 100644 --- a/docs/AuthenticatorsApi.md +++ b/docs/AuthenticatorsApi.md @@ -11,6 +11,12 @@ Method | HTTP request | Description [**authenticatorsAdminDuoPartialUpdate**](AuthenticatorsApi.md#authenticatorsAdminDuoPartialUpdate) | **PATCH** /authenticators/admin/duo/{id}/ | [**authenticatorsAdminDuoRetrieve**](AuthenticatorsApi.md#authenticatorsAdminDuoRetrieve) | **GET** /authenticators/admin/duo/{id}/ | [**authenticatorsAdminDuoUpdate**](AuthenticatorsApi.md#authenticatorsAdminDuoUpdate) | **PUT** /authenticators/admin/duo/{id}/ | +[**authenticatorsAdminMobileCreate**](AuthenticatorsApi.md#authenticatorsAdminMobileCreate) | **POST** /authenticators/admin/mobile/ | +[**authenticatorsAdminMobileDestroy**](AuthenticatorsApi.md#authenticatorsAdminMobileDestroy) | **DELETE** /authenticators/admin/mobile/{uuid}/ | +[**authenticatorsAdminMobileList**](AuthenticatorsApi.md#authenticatorsAdminMobileList) | **GET** /authenticators/admin/mobile/ | +[**authenticatorsAdminMobilePartialUpdate**](AuthenticatorsApi.md#authenticatorsAdminMobilePartialUpdate) | **PATCH** /authenticators/admin/mobile/{uuid}/ | +[**authenticatorsAdminMobileRetrieve**](AuthenticatorsApi.md#authenticatorsAdminMobileRetrieve) | **GET** /authenticators/admin/mobile/{uuid}/ | +[**authenticatorsAdminMobileUpdate**](AuthenticatorsApi.md#authenticatorsAdminMobileUpdate) | **PUT** /authenticators/admin/mobile/{uuid}/ | [**authenticatorsAdminSmsCreate**](AuthenticatorsApi.md#authenticatorsAdminSmsCreate) | **POST** /authenticators/admin/sms/ | [**authenticatorsAdminSmsDestroy**](AuthenticatorsApi.md#authenticatorsAdminSmsDestroy) | **DELETE** /authenticators/admin/sms/{id}/ | [**authenticatorsAdminSmsList**](AuthenticatorsApi.md#authenticatorsAdminSmsList) | **GET** /authenticators/admin/sms/ | @@ -42,6 +48,16 @@ Method | HTTP request | Description [**authenticatorsDuoRetrieve**](AuthenticatorsApi.md#authenticatorsDuoRetrieve) | **GET** /authenticators/duo/{id}/ | [**authenticatorsDuoUpdate**](AuthenticatorsApi.md#authenticatorsDuoUpdate) | **PUT** /authenticators/duo/{id}/ | [**authenticatorsDuoUsedByList**](AuthenticatorsApi.md#authenticatorsDuoUsedByList) | **GET** /authenticators/duo/{id}/used_by/ | +[**authenticatorsMobileCheckInCreate**](AuthenticatorsApi.md#authenticatorsMobileCheckInCreate) | **POST** /authenticators/mobile/{uuid}/check_in/ | +[**authenticatorsMobileDestroy**](AuthenticatorsApi.md#authenticatorsMobileDestroy) | **DELETE** /authenticators/mobile/{uuid}/ | +[**authenticatorsMobileEnrollmentCallbackCreate**](AuthenticatorsApi.md#authenticatorsMobileEnrollmentCallbackCreate) | **POST** /authenticators/mobile/{uuid}/enrollment_callback/ | +[**authenticatorsMobileEnrollmentStatusCreate**](AuthenticatorsApi.md#authenticatorsMobileEnrollmentStatusCreate) | **POST** /authenticators/mobile/{uuid}/enrollment_status/ | +[**authenticatorsMobileList**](AuthenticatorsApi.md#authenticatorsMobileList) | **GET** /authenticators/mobile/ | +[**authenticatorsMobilePartialUpdate**](AuthenticatorsApi.md#authenticatorsMobilePartialUpdate) | **PATCH** /authenticators/mobile/{uuid}/ | +[**authenticatorsMobileReceiveResponseCreate**](AuthenticatorsApi.md#authenticatorsMobileReceiveResponseCreate) | **POST** /authenticators/mobile/{uuid}/receive_response/ | +[**authenticatorsMobileRetrieve**](AuthenticatorsApi.md#authenticatorsMobileRetrieve) | **GET** /authenticators/mobile/{uuid}/ | +[**authenticatorsMobileUpdate**](AuthenticatorsApi.md#authenticatorsMobileUpdate) | **PUT** /authenticators/mobile/{uuid}/ | +[**authenticatorsMobileUsedByList**](AuthenticatorsApi.md#authenticatorsMobileUsedByList) | **GET** /authenticators/mobile/{uuid}/used_by/ | [**authenticatorsSmsDestroy**](AuthenticatorsApi.md#authenticatorsSmsDestroy) | **DELETE** /authenticators/sms/{id}/ | [**authenticatorsSmsList**](AuthenticatorsApi.md#authenticatorsSmsList) | **GET** /authenticators/sms/ | [**authenticatorsSmsPartialUpdate**](AuthenticatorsApi.md#authenticatorsSmsPartialUpdate) | **PATCH** /authenticators/sms/{id}/ | @@ -420,6 +436,317 @@ Name | Type | Description | Notes ### Authorization +Configure authentik: + ApiClient.apiKey["Authorization"] = "" + ApiClient.apiKeyPrefix["Authorization"] = "" + +### HTTP request headers + + - **Content-Type**: application/json + - **Accept**: application/json + + +# **authenticatorsAdminMobileCreate** +> MobileDevice authenticatorsAdminMobileCreate(mobileDeviceRequest) + + + +Viewset for Mobile authenticator devices (for admins) + +### Example +```kotlin +// Import classes: +//import io.goauthentik.api.infrastructure.* +//import io.goauthentik.api.models.* + +val apiInstance = AuthenticatorsApi() +val mobileDeviceRequest : MobileDeviceRequest = // MobileDeviceRequest | +try { + val result : MobileDevice = apiInstance.authenticatorsAdminMobileCreate(mobileDeviceRequest) + println(result) +} catch (e: ClientException) { + println("4xx response calling AuthenticatorsApi#authenticatorsAdminMobileCreate") + e.printStackTrace() +} catch (e: ServerException) { + println("5xx response calling AuthenticatorsApi#authenticatorsAdminMobileCreate") + e.printStackTrace() +} +``` + +### Parameters + +Name | Type | Description | Notes +------------- | ------------- | ------------- | ------------- + **mobileDeviceRequest** | [**MobileDeviceRequest**](MobileDeviceRequest.md)| | + +### Return type + +[**MobileDevice**](MobileDevice.md) + +### Authorization + + +Configure authentik: + ApiClient.apiKey["Authorization"] = "" + ApiClient.apiKeyPrefix["Authorization"] = "" + +### HTTP request headers + + - **Content-Type**: application/json + - **Accept**: application/json + + +# **authenticatorsAdminMobileDestroy** +> authenticatorsAdminMobileDestroy(uuid) + + + +Viewset for Mobile authenticator devices (for admins) + +### Example +```kotlin +// Import classes: +//import io.goauthentik.api.infrastructure.* +//import io.goauthentik.api.models.* + +val apiInstance = AuthenticatorsApi() +val uuid : java.util.UUID = 38400000-8cf0-11bd-b23e-10b96e4ef00d // java.util.UUID | A UUID string identifying this Mobile Device. +try { + apiInstance.authenticatorsAdminMobileDestroy(uuid) +} catch (e: ClientException) { + println("4xx response calling AuthenticatorsApi#authenticatorsAdminMobileDestroy") + e.printStackTrace() +} catch (e: ServerException) { + println("5xx response calling AuthenticatorsApi#authenticatorsAdminMobileDestroy") + e.printStackTrace() +} +``` + +### Parameters + +Name | Type | Description | Notes +------------- | ------------- | ------------- | ------------- + **uuid** | **java.util.UUID**| A UUID string identifying this Mobile Device. | + +### Return type + +null (empty response body) + +### Authorization + + +Configure authentik: + ApiClient.apiKey["Authorization"] = "" + ApiClient.apiKeyPrefix["Authorization"] = "" + +### HTTP request headers + + - **Content-Type**: Not defined + - **Accept**: application/json + + +# **authenticatorsAdminMobileList** +> PaginatedMobileDeviceList authenticatorsAdminMobileList(name, ordering, page, pageSize, search) + + + +Viewset for Mobile authenticator devices (for admins) + +### Example +```kotlin +// Import classes: +//import io.goauthentik.api.infrastructure.* +//import io.goauthentik.api.models.* + +val apiInstance = AuthenticatorsApi() +val name : kotlin.String = name_example // kotlin.String | +val ordering : kotlin.String = ordering_example // kotlin.String | Which field to use when ordering the results. +val page : kotlin.Int = 56 // kotlin.Int | A page number within the paginated result set. +val pageSize : kotlin.Int = 56 // kotlin.Int | Number of results to return per page. +val search : kotlin.String = search_example // kotlin.String | A search term. +try { + val result : PaginatedMobileDeviceList = apiInstance.authenticatorsAdminMobileList(name, ordering, page, pageSize, search) + println(result) +} catch (e: ClientException) { + println("4xx response calling AuthenticatorsApi#authenticatorsAdminMobileList") + e.printStackTrace() +} catch (e: ServerException) { + println("5xx response calling AuthenticatorsApi#authenticatorsAdminMobileList") + e.printStackTrace() +} +``` + +### Parameters + +Name | Type | Description | Notes +------------- | ------------- | ------------- | ------------- + **name** | **kotlin.String**| | [optional] + **ordering** | **kotlin.String**| Which field to use when ordering the results. | [optional] + **page** | **kotlin.Int**| A page number within the paginated result set. | [optional] + **pageSize** | **kotlin.Int**| Number of results to return per page. | [optional] + **search** | **kotlin.String**| A search term. | [optional] + +### Return type + +[**PaginatedMobileDeviceList**](PaginatedMobileDeviceList.md) + +### Authorization + + +Configure authentik: + ApiClient.apiKey["Authorization"] = "" + ApiClient.apiKeyPrefix["Authorization"] = "" + +### HTTP request headers + + - **Content-Type**: Not defined + - **Accept**: application/json + + +# **authenticatorsAdminMobilePartialUpdate** +> MobileDevice authenticatorsAdminMobilePartialUpdate(uuid, patchedMobileDeviceRequest) + + + +Viewset for Mobile authenticator devices (for admins) + +### Example +```kotlin +// Import classes: +//import io.goauthentik.api.infrastructure.* +//import io.goauthentik.api.models.* + +val apiInstance = AuthenticatorsApi() +val uuid : java.util.UUID = 38400000-8cf0-11bd-b23e-10b96e4ef00d // java.util.UUID | A UUID string identifying this Mobile Device. +val patchedMobileDeviceRequest : PatchedMobileDeviceRequest = // PatchedMobileDeviceRequest | +try { + val result : MobileDevice = apiInstance.authenticatorsAdminMobilePartialUpdate(uuid, patchedMobileDeviceRequest) + println(result) +} catch (e: ClientException) { + println("4xx response calling AuthenticatorsApi#authenticatorsAdminMobilePartialUpdate") + e.printStackTrace() +} catch (e: ServerException) { + println("5xx response calling AuthenticatorsApi#authenticatorsAdminMobilePartialUpdate") + e.printStackTrace() +} +``` + +### Parameters + +Name | Type | Description | Notes +------------- | ------------- | ------------- | ------------- + **uuid** | **java.util.UUID**| A UUID string identifying this Mobile Device. | + **patchedMobileDeviceRequest** | [**PatchedMobileDeviceRequest**](PatchedMobileDeviceRequest.md)| | [optional] + +### Return type + +[**MobileDevice**](MobileDevice.md) + +### Authorization + + +Configure authentik: + ApiClient.apiKey["Authorization"] = "" + ApiClient.apiKeyPrefix["Authorization"] = "" + +### HTTP request headers + + - **Content-Type**: application/json + - **Accept**: application/json + + +# **authenticatorsAdminMobileRetrieve** +> MobileDevice authenticatorsAdminMobileRetrieve(uuid) + + + +Viewset for Mobile authenticator devices (for admins) + +### Example +```kotlin +// Import classes: +//import io.goauthentik.api.infrastructure.* +//import io.goauthentik.api.models.* + +val apiInstance = AuthenticatorsApi() +val uuid : java.util.UUID = 38400000-8cf0-11bd-b23e-10b96e4ef00d // java.util.UUID | A UUID string identifying this Mobile Device. +try { + val result : MobileDevice = apiInstance.authenticatorsAdminMobileRetrieve(uuid) + println(result) +} catch (e: ClientException) { + println("4xx response calling AuthenticatorsApi#authenticatorsAdminMobileRetrieve") + e.printStackTrace() +} catch (e: ServerException) { + println("5xx response calling AuthenticatorsApi#authenticatorsAdminMobileRetrieve") + e.printStackTrace() +} +``` + +### Parameters + +Name | Type | Description | Notes +------------- | ------------- | ------------- | ------------- + **uuid** | **java.util.UUID**| A UUID string identifying this Mobile Device. | + +### Return type + +[**MobileDevice**](MobileDevice.md) + +### Authorization + + +Configure authentik: + ApiClient.apiKey["Authorization"] = "" + ApiClient.apiKeyPrefix["Authorization"] = "" + +### HTTP request headers + + - **Content-Type**: Not defined + - **Accept**: application/json + + +# **authenticatorsAdminMobileUpdate** +> MobileDevice authenticatorsAdminMobileUpdate(uuid, mobileDeviceRequest) + + + +Viewset for Mobile authenticator devices (for admins) + +### Example +```kotlin +// Import classes: +//import io.goauthentik.api.infrastructure.* +//import io.goauthentik.api.models.* + +val apiInstance = AuthenticatorsApi() +val uuid : java.util.UUID = 38400000-8cf0-11bd-b23e-10b96e4ef00d // java.util.UUID | A UUID string identifying this Mobile Device. +val mobileDeviceRequest : MobileDeviceRequest = // MobileDeviceRequest | +try { + val result : MobileDevice = apiInstance.authenticatorsAdminMobileUpdate(uuid, mobileDeviceRequest) + println(result) +} catch (e: ClientException) { + println("4xx response calling AuthenticatorsApi#authenticatorsAdminMobileUpdate") + e.printStackTrace() +} catch (e: ServerException) { + println("5xx response calling AuthenticatorsApi#authenticatorsAdminMobileUpdate") + e.printStackTrace() +} +``` + +### Parameters + +Name | Type | Description | Notes +------------- | ------------- | ------------- | ------------- + **uuid** | **java.util.UUID**| A UUID string identifying this Mobile Device. | + **mobileDeviceRequest** | [**MobileDeviceRequest**](MobileDeviceRequest.md)| | + +### Return type + +[**MobileDevice**](MobileDevice.md) + +### Authorization + + Configure authentik: ApiClient.apiKey["Authorization"] = "" ApiClient.apiKeyPrefix["Authorization"] = "" @@ -2021,6 +2348,521 @@ Name | Type | Description | Notes ### Authorization +Configure authentik: + ApiClient.apiKey["Authorization"] = "" + ApiClient.apiKeyPrefix["Authorization"] = "" + +### HTTP request headers + + - **Content-Type**: Not defined + - **Accept**: application/json + + +# **authenticatorsMobileCheckInCreate** +> authenticatorsMobileCheckInCreate(uuid, mobileDeviceCheckInRequest) + + + +Check in data about a device + +### Example +```kotlin +// Import classes: +//import io.goauthentik.api.infrastructure.* +//import io.goauthentik.api.models.* + +val apiInstance = AuthenticatorsApi() +val uuid : java.util.UUID = 38400000-8cf0-11bd-b23e-10b96e4ef00d // java.util.UUID | A UUID string identifying this Mobile Device. +val mobileDeviceCheckInRequest : MobileDeviceCheckInRequest = // MobileDeviceCheckInRequest | +try { + apiInstance.authenticatorsMobileCheckInCreate(uuid, mobileDeviceCheckInRequest) +} catch (e: ClientException) { + println("4xx response calling AuthenticatorsApi#authenticatorsMobileCheckInCreate") + e.printStackTrace() +} catch (e: ServerException) { + println("5xx response calling AuthenticatorsApi#authenticatorsMobileCheckInCreate") + e.printStackTrace() +} +``` + +### Parameters + +Name | Type | Description | Notes +------------- | ------------- | ------------- | ------------- + **uuid** | **java.util.UUID**| A UUID string identifying this Mobile Device. | + **mobileDeviceCheckInRequest** | [**MobileDeviceCheckInRequest**](MobileDeviceCheckInRequest.md)| | + +### Return type + +null (empty response body) + +### Authorization + + +Configure mobile_device_token: + ApiClient.apiKey["Authorization"] = "" + ApiClient.apiKeyPrefix["Authorization"] = "" + +### HTTP request headers + + - **Content-Type**: application/json + - **Accept**: application/json + + +# **authenticatorsMobileDestroy** +> authenticatorsMobileDestroy(uuid) + + + +Viewset for Mobile authenticator devices + +### Example +```kotlin +// Import classes: +//import io.goauthentik.api.infrastructure.* +//import io.goauthentik.api.models.* + +val apiInstance = AuthenticatorsApi() +val uuid : java.util.UUID = 38400000-8cf0-11bd-b23e-10b96e4ef00d // java.util.UUID | A UUID string identifying this Mobile Device. +try { + apiInstance.authenticatorsMobileDestroy(uuid) +} catch (e: ClientException) { + println("4xx response calling AuthenticatorsApi#authenticatorsMobileDestroy") + e.printStackTrace() +} catch (e: ServerException) { + println("5xx response calling AuthenticatorsApi#authenticatorsMobileDestroy") + e.printStackTrace() +} +``` + +### Parameters + +Name | Type | Description | Notes +------------- | ------------- | ------------- | ------------- + **uuid** | **java.util.UUID**| A UUID string identifying this Mobile Device. | + +### Return type + +null (empty response body) + +### Authorization + + +Configure authentik: + ApiClient.apiKey["Authorization"] = "" + ApiClient.apiKeyPrefix["Authorization"] = "" + +### HTTP request headers + + - **Content-Type**: Not defined + - **Accept**: application/json + + +# **authenticatorsMobileEnrollmentCallbackCreate** +> MobileDeviceEnrollmentCallback authenticatorsMobileEnrollmentCallbackCreate(uuid, mobileDeviceEnrollmentRequest) + + + +Enrollment callback + +### Example +```kotlin +// Import classes: +//import io.goauthentik.api.infrastructure.* +//import io.goauthentik.api.models.* + +val apiInstance = AuthenticatorsApi() +val uuid : java.util.UUID = 38400000-8cf0-11bd-b23e-10b96e4ef00d // java.util.UUID | A UUID string identifying this Mobile Device. +val mobileDeviceEnrollmentRequest : MobileDeviceEnrollmentRequest = // MobileDeviceEnrollmentRequest | +try { + val result : MobileDeviceEnrollmentCallback = apiInstance.authenticatorsMobileEnrollmentCallbackCreate(uuid, mobileDeviceEnrollmentRequest) + println(result) +} catch (e: ClientException) { + println("4xx response calling AuthenticatorsApi#authenticatorsMobileEnrollmentCallbackCreate") + e.printStackTrace() +} catch (e: ServerException) { + println("5xx response calling AuthenticatorsApi#authenticatorsMobileEnrollmentCallbackCreate") + e.printStackTrace() +} +``` + +### Parameters + +Name | Type | Description | Notes +------------- | ------------- | ------------- | ------------- + **uuid** | **java.util.UUID**| A UUID string identifying this Mobile Device. | + **mobileDeviceEnrollmentRequest** | [**MobileDeviceEnrollmentRequest**](MobileDeviceEnrollmentRequest.md)| | + +### Return type + +[**MobileDeviceEnrollmentCallback**](MobileDeviceEnrollmentCallback.md) + +### Authorization + + +Configure mobile_device_token: + ApiClient.apiKey["Authorization"] = "" + ApiClient.apiKeyPrefix["Authorization"] = "" + +### HTTP request headers + + - **Content-Type**: application/json + - **Accept**: application/json + + +# **authenticatorsMobileEnrollmentStatusCreate** +> MobileDeviceEnrollmentStatus authenticatorsMobileEnrollmentStatusCreate(uuid) + + + +Check device enrollment status + +### Example +```kotlin +// Import classes: +//import io.goauthentik.api.infrastructure.* +//import io.goauthentik.api.models.* + +val apiInstance = AuthenticatorsApi() +val uuid : java.util.UUID = 38400000-8cf0-11bd-b23e-10b96e4ef00d // java.util.UUID | A UUID string identifying this Mobile Device. +try { + val result : MobileDeviceEnrollmentStatus = apiInstance.authenticatorsMobileEnrollmentStatusCreate(uuid) + println(result) +} catch (e: ClientException) { + println("4xx response calling AuthenticatorsApi#authenticatorsMobileEnrollmentStatusCreate") + e.printStackTrace() +} catch (e: ServerException) { + println("5xx response calling AuthenticatorsApi#authenticatorsMobileEnrollmentStatusCreate") + e.printStackTrace() +} +``` + +### Parameters + +Name | Type | Description | Notes +------------- | ------------- | ------------- | ------------- + **uuid** | **java.util.UUID**| A UUID string identifying this Mobile Device. | + +### Return type + +[**MobileDeviceEnrollmentStatus**](MobileDeviceEnrollmentStatus.md) + +### Authorization + + +Configure mobile_device_token: + ApiClient.apiKey["Authorization"] = "" + ApiClient.apiKeyPrefix["Authorization"] = "" + +### HTTP request headers + + - **Content-Type**: Not defined + - **Accept**: application/json + + +# **authenticatorsMobileList** +> PaginatedMobileDeviceList authenticatorsMobileList(name, ordering, page, pageSize, search) + + + +Viewset for Mobile authenticator devices + +### Example +```kotlin +// Import classes: +//import io.goauthentik.api.infrastructure.* +//import io.goauthentik.api.models.* + +val apiInstance = AuthenticatorsApi() +val name : kotlin.String = name_example // kotlin.String | +val ordering : kotlin.String = ordering_example // kotlin.String | Which field to use when ordering the results. +val page : kotlin.Int = 56 // kotlin.Int | A page number within the paginated result set. +val pageSize : kotlin.Int = 56 // kotlin.Int | Number of results to return per page. +val search : kotlin.String = search_example // kotlin.String | A search term. +try { + val result : PaginatedMobileDeviceList = apiInstance.authenticatorsMobileList(name, ordering, page, pageSize, search) + println(result) +} catch (e: ClientException) { + println("4xx response calling AuthenticatorsApi#authenticatorsMobileList") + e.printStackTrace() +} catch (e: ServerException) { + println("5xx response calling AuthenticatorsApi#authenticatorsMobileList") + e.printStackTrace() +} +``` + +### Parameters + +Name | Type | Description | Notes +------------- | ------------- | ------------- | ------------- + **name** | **kotlin.String**| | [optional] + **ordering** | **kotlin.String**| Which field to use when ordering the results. | [optional] + **page** | **kotlin.Int**| A page number within the paginated result set. | [optional] + **pageSize** | **kotlin.Int**| Number of results to return per page. | [optional] + **search** | **kotlin.String**| A search term. | [optional] + +### Return type + +[**PaginatedMobileDeviceList**](PaginatedMobileDeviceList.md) + +### Authorization + + +Configure authentik: + ApiClient.apiKey["Authorization"] = "" + ApiClient.apiKeyPrefix["Authorization"] = "" + +### HTTP request headers + + - **Content-Type**: Not defined + - **Accept**: application/json + + +# **authenticatorsMobilePartialUpdate** +> MobileDevice authenticatorsMobilePartialUpdate(uuid, patchedMobileDeviceRequest) + + + +Viewset for Mobile authenticator devices + +### Example +```kotlin +// Import classes: +//import io.goauthentik.api.infrastructure.* +//import io.goauthentik.api.models.* + +val apiInstance = AuthenticatorsApi() +val uuid : java.util.UUID = 38400000-8cf0-11bd-b23e-10b96e4ef00d // java.util.UUID | A UUID string identifying this Mobile Device. +val patchedMobileDeviceRequest : PatchedMobileDeviceRequest = // PatchedMobileDeviceRequest | +try { + val result : MobileDevice = apiInstance.authenticatorsMobilePartialUpdate(uuid, patchedMobileDeviceRequest) + println(result) +} catch (e: ClientException) { + println("4xx response calling AuthenticatorsApi#authenticatorsMobilePartialUpdate") + e.printStackTrace() +} catch (e: ServerException) { + println("5xx response calling AuthenticatorsApi#authenticatorsMobilePartialUpdate") + e.printStackTrace() +} +``` + +### Parameters + +Name | Type | Description | Notes +------------- | ------------- | ------------- | ------------- + **uuid** | **java.util.UUID**| A UUID string identifying this Mobile Device. | + **patchedMobileDeviceRequest** | [**PatchedMobileDeviceRequest**](PatchedMobileDeviceRequest.md)| | [optional] + +### Return type + +[**MobileDevice**](MobileDevice.md) + +### Authorization + + +Configure authentik: + ApiClient.apiKey["Authorization"] = "" + ApiClient.apiKeyPrefix["Authorization"] = "" + +### HTTP request headers + + - **Content-Type**: application/json + - **Accept**: application/json + + +# **authenticatorsMobileReceiveResponseCreate** +> authenticatorsMobileReceiveResponseCreate(uuid, mobileDeviceResponseRequest) + + + +Get response from notification on phone + +### Example +```kotlin +// Import classes: +//import io.goauthentik.api.infrastructure.* +//import io.goauthentik.api.models.* + +val apiInstance = AuthenticatorsApi() +val uuid : java.util.UUID = 38400000-8cf0-11bd-b23e-10b96e4ef00d // java.util.UUID | A UUID string identifying this Mobile Device. +val mobileDeviceResponseRequest : MobileDeviceResponseRequest = // MobileDeviceResponseRequest | +try { + apiInstance.authenticatorsMobileReceiveResponseCreate(uuid, mobileDeviceResponseRequest) +} catch (e: ClientException) { + println("4xx response calling AuthenticatorsApi#authenticatorsMobileReceiveResponseCreate") + e.printStackTrace() +} catch (e: ServerException) { + println("5xx response calling AuthenticatorsApi#authenticatorsMobileReceiveResponseCreate") + e.printStackTrace() +} +``` + +### Parameters + +Name | Type | Description | Notes +------------- | ------------- | ------------- | ------------- + **uuid** | **java.util.UUID**| A UUID string identifying this Mobile Device. | + **mobileDeviceResponseRequest** | [**MobileDeviceResponseRequest**](MobileDeviceResponseRequest.md)| | + +### Return type + +null (empty response body) + +### Authorization + + +Configure mobile_device_token: + ApiClient.apiKey["Authorization"] = "" + ApiClient.apiKeyPrefix["Authorization"] = "" + +### HTTP request headers + + - **Content-Type**: application/json + - **Accept**: application/json + + +# **authenticatorsMobileRetrieve** +> MobileDevice authenticatorsMobileRetrieve(uuid) + + + +Viewset for Mobile authenticator devices + +### Example +```kotlin +// Import classes: +//import io.goauthentik.api.infrastructure.* +//import io.goauthentik.api.models.* + +val apiInstance = AuthenticatorsApi() +val uuid : java.util.UUID = 38400000-8cf0-11bd-b23e-10b96e4ef00d // java.util.UUID | A UUID string identifying this Mobile Device. +try { + val result : MobileDevice = apiInstance.authenticatorsMobileRetrieve(uuid) + println(result) +} catch (e: ClientException) { + println("4xx response calling AuthenticatorsApi#authenticatorsMobileRetrieve") + e.printStackTrace() +} catch (e: ServerException) { + println("5xx response calling AuthenticatorsApi#authenticatorsMobileRetrieve") + e.printStackTrace() +} +``` + +### Parameters + +Name | Type | Description | Notes +------------- | ------------- | ------------- | ------------- + **uuid** | **java.util.UUID**| A UUID string identifying this Mobile Device. | + +### Return type + +[**MobileDevice**](MobileDevice.md) + +### Authorization + + +Configure authentik: + ApiClient.apiKey["Authorization"] = "" + ApiClient.apiKeyPrefix["Authorization"] = "" + +### HTTP request headers + + - **Content-Type**: Not defined + - **Accept**: application/json + + +# **authenticatorsMobileUpdate** +> MobileDevice authenticatorsMobileUpdate(uuid, mobileDeviceRequest) + + + +Viewset for Mobile authenticator devices + +### Example +```kotlin +// Import classes: +//import io.goauthentik.api.infrastructure.* +//import io.goauthentik.api.models.* + +val apiInstance = AuthenticatorsApi() +val uuid : java.util.UUID = 38400000-8cf0-11bd-b23e-10b96e4ef00d // java.util.UUID | A UUID string identifying this Mobile Device. +val mobileDeviceRequest : MobileDeviceRequest = // MobileDeviceRequest | +try { + val result : MobileDevice = apiInstance.authenticatorsMobileUpdate(uuid, mobileDeviceRequest) + println(result) +} catch (e: ClientException) { + println("4xx response calling AuthenticatorsApi#authenticatorsMobileUpdate") + e.printStackTrace() +} catch (e: ServerException) { + println("5xx response calling AuthenticatorsApi#authenticatorsMobileUpdate") + e.printStackTrace() +} +``` + +### Parameters + +Name | Type | Description | Notes +------------- | ------------- | ------------- | ------------- + **uuid** | **java.util.UUID**| A UUID string identifying this Mobile Device. | + **mobileDeviceRequest** | [**MobileDeviceRequest**](MobileDeviceRequest.md)| | + +### Return type + +[**MobileDevice**](MobileDevice.md) + +### Authorization + + +Configure authentik: + ApiClient.apiKey["Authorization"] = "" + ApiClient.apiKeyPrefix["Authorization"] = "" + +### HTTP request headers + + - **Content-Type**: application/json + - **Accept**: application/json + + +# **authenticatorsMobileUsedByList** +> kotlin.collections.List<UsedBy> authenticatorsMobileUsedByList(uuid) + + + +Get a list of all objects that use this object + +### Example +```kotlin +// Import classes: +//import io.goauthentik.api.infrastructure.* +//import io.goauthentik.api.models.* + +val apiInstance = AuthenticatorsApi() +val uuid : java.util.UUID = 38400000-8cf0-11bd-b23e-10b96e4ef00d // java.util.UUID | A UUID string identifying this Mobile Device. +try { + val result : kotlin.collections.List = apiInstance.authenticatorsMobileUsedByList(uuid) + println(result) +} catch (e: ClientException) { + println("4xx response calling AuthenticatorsApi#authenticatorsMobileUsedByList") + e.printStackTrace() +} catch (e: ServerException) { + println("5xx response calling AuthenticatorsApi#authenticatorsMobileUsedByList") + e.printStackTrace() +} +``` + +### Parameters + +Name | Type | Description | Notes +------------- | ------------- | ------------- | ------------- + **uuid** | **java.util.UUID**| A UUID string identifying this Mobile Device. | + +### Return type + +[**kotlin.collections.List<UsedBy>**](UsedBy.md) + +### Authorization + + Configure authentik: ApiClient.apiKey["Authorization"] = "" ApiClient.apiKeyPrefix["Authorization"] = "" diff --git a/docs/ChallengeTypes.md b/docs/ChallengeTypes.md index 938f4aa..2361479 100644 --- a/docs/ChallengeTypes.md +++ b/docs/ChallengeTypes.md @@ -14,6 +14,7 @@ Name | Type | Description | Notes **activationBarcode** | **kotlin.String** | | **activationCode** | **kotlin.String** | | **stageUuid** | **kotlin.String** | | +**payload** | [**AuthenticatorMobilePayloadChallenge**](AuthenticatorMobilePayloadChallenge.md) | | **codes** | **kotlin.collections.List<kotlin.String>** | | **configUrl** | **kotlin.String** | | **deviceChallenges** | [**kotlin.collections.List<DeviceChallenge>**](DeviceChallenge.md) | | diff --git a/docs/CoreApi.md b/docs/CoreApi.md index c1759cf..8daabc7 100644 --- a/docs/CoreApi.md +++ b/docs/CoreApi.md @@ -221,7 +221,7 @@ Configure authentik: # **coreApplicationsList** -> PaginatedApplicationList coreApplicationsList(group, metaDescription, metaLaunchUrl, metaPublisher, name, ordering, page, pageSize, search, slug, superuserFullList) +> PaginatedApplicationList coreApplicationsList(forUser, group, metaDescription, metaLaunchUrl, metaPublisher, name, ordering, page, pageSize, search, slug, superuserFullList) @@ -234,6 +234,7 @@ Custom list method that checks Policy based access instead of guardian //import io.goauthentik.api.models.* val apiInstance = CoreApi() +val forUser : kotlin.Int = 56 // kotlin.Int | val group : kotlin.String = group_example // kotlin.String | val metaDescription : kotlin.String = metaDescription_example // kotlin.String | val metaLaunchUrl : kotlin.String = metaLaunchUrl_example // kotlin.String | @@ -246,7 +247,7 @@ val search : kotlin.String = search_example // kotlin.String | A search term. val slug : kotlin.String = slug_example // kotlin.String | val superuserFullList : kotlin.Boolean = true // kotlin.Boolean | try { - val result : PaginatedApplicationList = apiInstance.coreApplicationsList(group, metaDescription, metaLaunchUrl, metaPublisher, name, ordering, page, pageSize, search, slug, superuserFullList) + val result : PaginatedApplicationList = apiInstance.coreApplicationsList(forUser, group, metaDescription, metaLaunchUrl, metaPublisher, name, ordering, page, pageSize, search, slug, superuserFullList) println(result) } catch (e: ClientException) { println("4xx response calling CoreApi#coreApplicationsList") @@ -261,6 +262,7 @@ try { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- + **forUser** | **kotlin.Int**| | [optional] **group** | **kotlin.String**| | [optional] **metaDescription** | **kotlin.String**| | [optional] **metaLaunchUrl** | **kotlin.String**| | [optional] @@ -948,6 +950,9 @@ This endpoint does not need any parameter. Configure authentik: ApiClient.apiKey["Authorization"] = "" ApiClient.apiKeyPrefix["Authorization"] = "" +Configure mobile_device_token: + ApiClient.apiKey["Authorization"] = "" + ApiClient.apiKeyPrefix["Authorization"] = "" ### HTTP request headers @@ -2806,6 +2811,9 @@ This endpoint does not need any parameter. Configure authentik: ApiClient.apiKey["Authorization"] = "" ApiClient.apiKeyPrefix["Authorization"] = "" +Configure mobile_device_token: + ApiClient.apiKey["Authorization"] = "" + ApiClient.apiKeyPrefix["Authorization"] = "" ### HTTP request headers diff --git a/docs/Device.md b/docs/Device.md index 84299c6..2d591da 100644 --- a/docs/Device.md +++ b/docs/Device.md @@ -7,10 +7,10 @@ Name | Type | Description | Notes **verboseName** | **kotlin.String** | Return object's verbose_name | [readonly] **verboseNamePlural** | **kotlin.String** | Return object's plural verbose_name | [readonly] **metaModelName** | **kotlin.String** | Return internal model name | [readonly] -**pk** | **kotlin.Int** | | +**pk** | **kotlin.String** | | **name** | **kotlin.String** | | **type** | **kotlin.String** | Get type of device | [readonly] -**confirmed** | **kotlin.Boolean** | | +**confirmed** | **kotlin.Boolean** | | [readonly] diff --git a/docs/DeviceClassesEnum.md b/docs/DeviceClassesEnum.md index 5e34688..aaa61bd 100644 --- a/docs/DeviceClassesEnum.md +++ b/docs/DeviceClassesEnum.md @@ -14,6 +14,8 @@ * `sms` (value: `"sms"`) + * `mobile` (value: `"mobile"`) + * `unknownDefaultOpenApi` (value: `"unknown_default_open_api"`) diff --git a/docs/DuoDevice.md b/docs/DuoDevice.md index 92fbc79..2d83e04 100644 --- a/docs/DuoDevice.md +++ b/docs/DuoDevice.md @@ -4,8 +4,13 @@ ## Properties Name | Type | Description | Notes ------------ | ------------- | ------------- | ------------- -**pk** | **kotlin.Int** | | [readonly] -**name** | **kotlin.String** | The human-readable name of this device. | +**verboseName** | **kotlin.String** | Return object's verbose_name | [readonly] +**verboseNamePlural** | **kotlin.String** | Return object's plural verbose_name | [readonly] +**metaModelName** | **kotlin.String** | Return internal model name | [readonly] +**pk** | **kotlin.String** | | +**name** | **kotlin.String** | | +**type** | **kotlin.String** | Get type of device | [readonly] +**confirmed** | **kotlin.Boolean** | | [readonly] diff --git a/docs/DuoDeviceRequest.md b/docs/DuoDeviceRequest.md index 2d61bc0..0bcd42b 100644 --- a/docs/DuoDeviceRequest.md +++ b/docs/DuoDeviceRequest.md @@ -4,7 +4,8 @@ ## Properties Name | Type | Description | Notes ------------ | ------------- | ------------- | ------------- -**name** | **kotlin.String** | The human-readable name of this device. | +**pk** | **kotlin.String** | | +**name** | **kotlin.String** | | diff --git a/docs/EventsApi.md b/docs/EventsApi.md index c49692e..0005d6b 100644 --- a/docs/EventsApi.md +++ b/docs/EventsApi.md @@ -28,6 +28,9 @@ Method | HTTP request | Description [**eventsRulesRetrieve**](EventsApi.md#eventsRulesRetrieve) | **GET** /events/rules/{pbm_uuid}/ | [**eventsRulesUpdate**](EventsApi.md#eventsRulesUpdate) | **PUT** /events/rules/{pbm_uuid}/ | [**eventsRulesUsedByList**](EventsApi.md#eventsRulesUsedByList) | **GET** /events/rules/{pbm_uuid}/used_by/ | +[**eventsSystemTasksList**](EventsApi.md#eventsSystemTasksList) | **GET** /events/system_tasks/ | +[**eventsSystemTasksRetrieve**](EventsApi.md#eventsSystemTasksRetrieve) | **GET** /events/system_tasks/{uuid}/ | +[**eventsSystemTasksRunCreate**](EventsApi.md#eventsSystemTasksRunCreate) | **POST** /events/system_tasks/{uuid}/run/ | [**eventsTransportsCreate**](EventsApi.md#eventsTransportsCreate) | **POST** /events/transports/ | [**eventsTransportsDestroy**](EventsApi.md#eventsTransportsDestroy) | **DELETE** /events/transports/{uuid}/ | [**eventsTransportsList**](EventsApi.md#eventsTransportsList) | **GET** /events/transports/ | @@ -1303,6 +1306,167 @@ Name | Type | Description | Notes ### Authorization +Configure authentik: + ApiClient.apiKey["Authorization"] = "" + ApiClient.apiKeyPrefix["Authorization"] = "" + +### HTTP request headers + + - **Content-Type**: Not defined + - **Accept**: application/json + + +# **eventsSystemTasksList** +> PaginatedSystemTaskList eventsSystemTasksList(name, ordering, page, pageSize, search, status, uid) + + + +Read-only view set that returns all background tasks + +### Example +```kotlin +// Import classes: +//import io.goauthentik.api.infrastructure.* +//import io.goauthentik.api.models.* + +val apiInstance = EventsApi() +val name : kotlin.String = name_example // kotlin.String | +val ordering : kotlin.String = ordering_example // kotlin.String | Which field to use when ordering the results. +val page : kotlin.Int = 56 // kotlin.Int | A page number within the paginated result set. +val pageSize : kotlin.Int = 56 // kotlin.Int | Number of results to return per page. +val search : kotlin.String = search_example // kotlin.String | A search term. +val status : kotlin.String = status_example // kotlin.String | * `unknown` - Unknown * `successful` - Successful * `warning` - Warning * `error` - Error +val uid : kotlin.String = uid_example // kotlin.String | +try { + val result : PaginatedSystemTaskList = apiInstance.eventsSystemTasksList(name, ordering, page, pageSize, search, status, uid) + println(result) +} catch (e: ClientException) { + println("4xx response calling EventsApi#eventsSystemTasksList") + e.printStackTrace() +} catch (e: ServerException) { + println("5xx response calling EventsApi#eventsSystemTasksList") + e.printStackTrace() +} +``` + +### Parameters + +Name | Type | Description | Notes +------------- | ------------- | ------------- | ------------- + **name** | **kotlin.String**| | [optional] + **ordering** | **kotlin.String**| Which field to use when ordering the results. | [optional] + **page** | **kotlin.Int**| A page number within the paginated result set. | [optional] + **pageSize** | **kotlin.Int**| Number of results to return per page. | [optional] + **search** | **kotlin.String**| A search term. | [optional] + **status** | **kotlin.String**| * `unknown` - Unknown * `successful` - Successful * `warning` - Warning * `error` - Error | [optional] [enum: error, successful, unknown, warning] + **uid** | **kotlin.String**| | [optional] + +### Return type + +[**PaginatedSystemTaskList**](PaginatedSystemTaskList.md) + +### Authorization + + +Configure authentik: + ApiClient.apiKey["Authorization"] = "" + ApiClient.apiKeyPrefix["Authorization"] = "" + +### HTTP request headers + + - **Content-Type**: Not defined + - **Accept**: application/json + + +# **eventsSystemTasksRetrieve** +> SystemTask eventsSystemTasksRetrieve(uuid) + + + +Read-only view set that returns all background tasks + +### Example +```kotlin +// Import classes: +//import io.goauthentik.api.infrastructure.* +//import io.goauthentik.api.models.* + +val apiInstance = EventsApi() +val uuid : java.util.UUID = 38400000-8cf0-11bd-b23e-10b96e4ef00d // java.util.UUID | A UUID string identifying this System Task. +try { + val result : SystemTask = apiInstance.eventsSystemTasksRetrieve(uuid) + println(result) +} catch (e: ClientException) { + println("4xx response calling EventsApi#eventsSystemTasksRetrieve") + e.printStackTrace() +} catch (e: ServerException) { + println("5xx response calling EventsApi#eventsSystemTasksRetrieve") + e.printStackTrace() +} +``` + +### Parameters + +Name | Type | Description | Notes +------------- | ------------- | ------------- | ------------- + **uuid** | **java.util.UUID**| A UUID string identifying this System Task. | + +### Return type + +[**SystemTask**](SystemTask.md) + +### Authorization + + +Configure authentik: + ApiClient.apiKey["Authorization"] = "" + ApiClient.apiKeyPrefix["Authorization"] = "" + +### HTTP request headers + + - **Content-Type**: Not defined + - **Accept**: application/json + + +# **eventsSystemTasksRunCreate** +> eventsSystemTasksRunCreate(uuid) + + + +Run task + +### Example +```kotlin +// Import classes: +//import io.goauthentik.api.infrastructure.* +//import io.goauthentik.api.models.* + +val apiInstance = EventsApi() +val uuid : java.util.UUID = 38400000-8cf0-11bd-b23e-10b96e4ef00d // java.util.UUID | A UUID string identifying this System Task. +try { + apiInstance.eventsSystemTasksRunCreate(uuid) +} catch (e: ClientException) { + println("4xx response calling EventsApi#eventsSystemTasksRunCreate") + e.printStackTrace() +} catch (e: ServerException) { + println("5xx response calling EventsApi#eventsSystemTasksRunCreate") + e.printStackTrace() +} +``` + +### Parameters + +Name | Type | Description | Notes +------------- | ------------- | ------------- | ------------- + **uuid** | **java.util.UUID**| A UUID string identifying this System Task. | + +### Return type + +null (empty response body) + +### Authorization + + Configure authentik: ApiClient.apiKey["Authorization"] = "" ApiClient.apiKeyPrefix["Authorization"] = "" diff --git a/docs/FlowChallengeResponseRequest.md b/docs/FlowChallengeResponseRequest.md index 18348fa..4f1d59d 100644 --- a/docs/FlowChallengeResponseRequest.md +++ b/docs/FlowChallengeResponseRequest.md @@ -16,6 +16,7 @@ Name | Type | Description | Notes **selectedStage** | **kotlin.String** | | [optional] **webauthn** | [**kotlin.collections.Map<kotlin.String, kotlin.Any>**](kotlin.Any.md) | | [optional] **duo** | **kotlin.Int** | | [optional] +**mobile** | **kotlin.String** | | [optional] diff --git a/docs/ItemMatchingModeEnum.md b/docs/ItemMatchingModeEnum.md new file mode 100644 index 0000000..71e6726 --- /dev/null +++ b/docs/ItemMatchingModeEnum.md @@ -0,0 +1,16 @@ + +# ItemMatchingModeEnum + +## Enum + + + * `acceptDeny` (value: `"accept_deny"`) + + * `numberMatching2` (value: `"number_matching_2"`) + + * `numberMatching3` (value: `"number_matching_3"`) + + * `unknownDefaultOpenApi` (value: `"unknown_default_open_api"`) + + + diff --git a/docs/LDAPSyncStatus.md b/docs/LDAPSyncStatus.md index 45b6225..c48e625 100644 --- a/docs/LDAPSyncStatus.md +++ b/docs/LDAPSyncStatus.md @@ -5,7 +5,7 @@ Name | Type | Description | Notes ------------ | ------------- | ------------- | ------------- **isRunning** | **kotlin.Boolean** | | [readonly] -**tasks** | [**kotlin.collections.List<Task>**](Task.md) | | [readonly] +**tasks** | [**kotlin.collections.List<SystemTask>**](SystemTask.md) | | [readonly] diff --git a/docs/MobileDevice.md b/docs/MobileDevice.md new file mode 100644 index 0000000..8246b5e --- /dev/null +++ b/docs/MobileDevice.md @@ -0,0 +1,18 @@ + +# MobileDevice + +## Properties +Name | Type | Description | Notes +------------ | ------------- | ------------- | ------------- +**verboseName** | **kotlin.String** | Return object's verbose_name | [readonly] +**verboseNamePlural** | **kotlin.String** | Return object's plural verbose_name | [readonly] +**metaModelName** | **kotlin.String** | Return internal model name | [readonly] +**pk** | **kotlin.String** | | +**name** | **kotlin.String** | | +**type** | **kotlin.String** | Get type of device | [readonly] +**confirmed** | **kotlin.Boolean** | | [readonly] +**state** | [**MobileDeviceInfo**](MobileDeviceInfo.md) | | [readonly] +**lastCheckin** | [**java.time.OffsetDateTime**](java.time.OffsetDateTime.md) | | [readonly] + + + diff --git a/docs/MobileDeviceCheckInRequest.md b/docs/MobileDeviceCheckInRequest.md new file mode 100644 index 0000000..abbe473 --- /dev/null +++ b/docs/MobileDeviceCheckInRequest.md @@ -0,0 +1,11 @@ + +# MobileDeviceCheckInRequest + +## Properties +Name | Type | Description | Notes +------------ | ------------- | ------------- | ------------- +**info** | [**MobileDeviceInfoRequest**](MobileDeviceInfoRequest.md) | | +**firebaseKey** | **kotlin.String** | | [optional] + + + diff --git a/docs/MobileDeviceEnrollmentCallback.md b/docs/MobileDeviceEnrollmentCallback.md new file mode 100644 index 0000000..8ed18ef --- /dev/null +++ b/docs/MobileDeviceEnrollmentCallback.md @@ -0,0 +1,10 @@ + +# MobileDeviceEnrollmentCallback + +## Properties +Name | Type | Description | Notes +------------ | ------------- | ------------- | ------------- +**token** | **kotlin.String** | | + + + diff --git a/docs/MobileDeviceEnrollmentRequest.md b/docs/MobileDeviceEnrollmentRequest.md new file mode 100644 index 0000000..97ed05f --- /dev/null +++ b/docs/MobileDeviceEnrollmentRequest.md @@ -0,0 +1,12 @@ + +# MobileDeviceEnrollmentRequest + +## Properties +Name | Type | Description | Notes +------------ | ------------- | ------------- | ------------- +**deviceUid** | **kotlin.String** | | +**info** | [**MobileDeviceInfoRequest**](MobileDeviceInfoRequest.md) | | +**firebaseKey** | **kotlin.String** | | [optional] + + + diff --git a/docs/MobileDeviceEnrollmentStatus.md b/docs/MobileDeviceEnrollmentStatus.md new file mode 100644 index 0000000..7731c56 --- /dev/null +++ b/docs/MobileDeviceEnrollmentStatus.md @@ -0,0 +1,10 @@ + +# MobileDeviceEnrollmentStatus + +## Properties +Name | Type | Description | Notes +------------ | ------------- | ------------- | ------------- +**status** | [**MobileDeviceEnrollmentStatusStatusEnum**](MobileDeviceEnrollmentStatusStatusEnum.md) | | + + + diff --git a/docs/MobileDeviceEnrollmentStatusStatusEnum.md b/docs/MobileDeviceEnrollmentStatusStatusEnum.md new file mode 100644 index 0000000..b5ba9cc --- /dev/null +++ b/docs/MobileDeviceEnrollmentStatusStatusEnum.md @@ -0,0 +1,14 @@ + +# MobileDeviceEnrollmentStatusStatusEnum + +## Enum + + + * `success` (value: `"success"`) + + * `waiting` (value: `"waiting"`) + + * `unknownDefaultOpenApi` (value: `"unknown_default_open_api"`) + + + diff --git a/docs/MobileDeviceInfo.md b/docs/MobileDeviceInfo.md new file mode 100644 index 0000000..86e4220 --- /dev/null +++ b/docs/MobileDeviceInfo.md @@ -0,0 +1,15 @@ + +# MobileDeviceInfo + +## Properties +Name | Type | Description | Notes +------------ | ------------- | ------------- | ------------- +**platform** | [**PlatformEnum**](PlatformEnum.md) | | +**osVersion** | **kotlin.String** | | +**model** | **kotlin.String** | | +**hostname** | **kotlin.String** | | +**appVersion** | **kotlin.String** | | +**others** | [**kotlin.Any**](.md) | | + + + diff --git a/docs/MobileDeviceInfoRequest.md b/docs/MobileDeviceInfoRequest.md new file mode 100644 index 0000000..757a0f5 --- /dev/null +++ b/docs/MobileDeviceInfoRequest.md @@ -0,0 +1,15 @@ + +# MobileDeviceInfoRequest + +## Properties +Name | Type | Description | Notes +------------ | ------------- | ------------- | ------------- +**platform** | [**PlatformEnum**](PlatformEnum.md) | | +**osVersion** | **kotlin.String** | | +**model** | **kotlin.String** | | +**hostname** | **kotlin.String** | | +**appVersion** | **kotlin.String** | | +**others** | [**kotlin.Any**](.md) | | + + + diff --git a/docs/MobileDeviceRequest.md b/docs/MobileDeviceRequest.md new file mode 100644 index 0000000..34f5853 --- /dev/null +++ b/docs/MobileDeviceRequest.md @@ -0,0 +1,11 @@ + +# MobileDeviceRequest + +## Properties +Name | Type | Description | Notes +------------ | ------------- | ------------- | ------------- +**pk** | **kotlin.String** | | +**name** | **kotlin.String** | | + + + diff --git a/docs/MobileDeviceResponseRequest.md b/docs/MobileDeviceResponseRequest.md new file mode 100644 index 0000000..b0b0888 --- /dev/null +++ b/docs/MobileDeviceResponseRequest.md @@ -0,0 +1,11 @@ + +# MobileDeviceResponseRequest + +## Properties +Name | Type | Description | Notes +------------ | ------------- | ------------- | ------------- +**txId** | [**java.util.UUID**](java.util.UUID.md) | | +**selectedItem** | **kotlin.String** | | + + + diff --git a/docs/ModelEnum.md b/docs/ModelEnum.md index fa8c585..8ecb379 100644 --- a/docs/ModelEnum.md +++ b/docs/ModelEnum.md @@ -40,8 +40,6 @@ * `policiesReputationPeriodReputationpolicy` (value: `"authentik_policies_reputation.reputationpolicy"`) - * `policiesReputationPeriodReputation` (value: `"authentik_policies_reputation.reputation"`) - * `policiesPeriodPolicybinding` (value: `"authentik_policies.policybinding"`) * `providersLdapPeriodLdapprovider` (value: `"authentik_providers_ldap.ldapprovider"`) @@ -50,12 +48,6 @@ * `providersOauth2PeriodOauth2provider` (value: `"authentik_providers_oauth2.oauth2provider"`) - * `providersOauth2PeriodAuthorizationcode` (value: `"authentik_providers_oauth2.authorizationcode"`) - - * `providersOauth2PeriodAccesstoken` (value: `"authentik_providers_oauth2.accesstoken"`) - - * `providersOauth2PeriodRefreshtoken` (value: `"authentik_providers_oauth2.refreshtoken"`) - * `providersProxyPeriodProxyprovider` (value: `"authentik_providers_proxy.proxyprovider"`) * `providersRadiusPeriodRadiusprovider` (value: `"authentik_providers_radius.radiusprovider"`) @@ -90,6 +82,10 @@ * `stagesAuthenticatorDuoPeriodDuodevice` (value: `"authentik_stages_authenticator_duo.duodevice"`) + * `stagesAuthenticatorMobilePeriodAuthenticatormobilestage` (value: `"authentik_stages_authenticator_mobile.authenticatormobilestage"`) + + * `stagesAuthenticatorMobilePeriodMobiledevice` (value: `"authentik_stages_authenticator_mobile.mobiledevice"`) + * `stagesAuthenticatorSmsPeriodAuthenticatorsmsstage` (value: `"authentik_stages_authenticator_sms.authenticatorsmsstage"`) * `stagesAuthenticatorSmsPeriodSmsdevice` (value: `"authentik_stages_authenticator_sms.smsdevice"`) diff --git a/docs/PaginatedAuthenticatorMobileStageList.md b/docs/PaginatedAuthenticatorMobileStageList.md new file mode 100644 index 0000000..ef8c2b9 --- /dev/null +++ b/docs/PaginatedAuthenticatorMobileStageList.md @@ -0,0 +1,11 @@ + +# PaginatedAuthenticatorMobileStageList + +## Properties +Name | Type | Description | Notes +------------ | ------------- | ------------- | ------------- +**pagination** | [**Pagination**](Pagination.md) | | +**results** | [**kotlin.collections.List<AuthenticatorMobileStage>**](AuthenticatorMobileStage.md) | | + + + diff --git a/docs/PaginatedMobileDeviceList.md b/docs/PaginatedMobileDeviceList.md new file mode 100644 index 0000000..dc5db44 --- /dev/null +++ b/docs/PaginatedMobileDeviceList.md @@ -0,0 +1,11 @@ + +# PaginatedMobileDeviceList + +## Properties +Name | Type | Description | Notes +------------ | ------------- | ------------- | ------------- +**pagination** | [**Pagination**](Pagination.md) | | +**results** | [**kotlin.collections.List<MobileDevice>**](MobileDevice.md) | | + + + diff --git a/docs/PaginatedSystemTaskList.md b/docs/PaginatedSystemTaskList.md new file mode 100644 index 0000000..1be74ba --- /dev/null +++ b/docs/PaginatedSystemTaskList.md @@ -0,0 +1,11 @@ + +# PaginatedSystemTaskList + +## Properties +Name | Type | Description | Notes +------------ | ------------- | ------------- | ------------- +**pagination** | [**Pagination**](Pagination.md) | | +**results** | [**kotlin.collections.List<SystemTask>**](SystemTask.md) | | + + + diff --git a/docs/PatchedAuthenticatorMobileStageRequest.md b/docs/PatchedAuthenticatorMobileStageRequest.md new file mode 100644 index 0000000..522afdf --- /dev/null +++ b/docs/PatchedAuthenticatorMobileStageRequest.md @@ -0,0 +1,15 @@ + +# PatchedAuthenticatorMobileStageRequest + +## Properties +Name | Type | Description | Notes +------------ | ------------- | ------------- | ------------- +**name** | **kotlin.String** | | [optional] +**flowSet** | [**kotlin.collections.List<FlowSetRequest>**](FlowSetRequest.md) | | [optional] +**configureFlow** | [**java.util.UUID**](java.util.UUID.md) | Flow used by an authenticated user to configure this Stage. If empty, user will not be able to configure this stage. | [optional] +**friendlyName** | **kotlin.String** | | [optional] +**itemMatchingMode** | [**ItemMatchingModeEnum**](ItemMatchingModeEnum.md) | | [optional] +**cgwEndpoint** | **kotlin.String** | | [optional] + + + diff --git a/docs/PatchedDuoDeviceRequest.md b/docs/PatchedDuoDeviceRequest.md index b958e0b..4d5fe83 100644 --- a/docs/PatchedDuoDeviceRequest.md +++ b/docs/PatchedDuoDeviceRequest.md @@ -4,7 +4,8 @@ ## Properties Name | Type | Description | Notes ------------ | ------------- | ------------- | ------------- -**name** | **kotlin.String** | The human-readable name of this device. | [optional] +**pk** | **kotlin.String** | | [optional] +**name** | **kotlin.String** | | [optional] diff --git a/docs/PatchedMobileDeviceRequest.md b/docs/PatchedMobileDeviceRequest.md new file mode 100644 index 0000000..78cb12a --- /dev/null +++ b/docs/PatchedMobileDeviceRequest.md @@ -0,0 +1,11 @@ + +# PatchedMobileDeviceRequest + +## Properties +Name | Type | Description | Notes +------------ | ------------- | ------------- | ------------- +**pk** | **kotlin.String** | | [optional] +**name** | **kotlin.String** | | [optional] + + + diff --git a/docs/PatchedSMSDeviceRequest.md b/docs/PatchedSMSDeviceRequest.md index c302a50..da7b7db 100644 --- a/docs/PatchedSMSDeviceRequest.md +++ b/docs/PatchedSMSDeviceRequest.md @@ -4,7 +4,8 @@ ## Properties Name | Type | Description | Notes ------------ | ------------- | ------------- | ------------- -**name** | **kotlin.String** | The human-readable name of this device. | [optional] +**pk** | **kotlin.String** | | [optional] +**name** | **kotlin.String** | | [optional] diff --git a/docs/PatchedStaticDeviceRequest.md b/docs/PatchedStaticDeviceRequest.md index 3f14be5..6d6b70e 100644 --- a/docs/PatchedStaticDeviceRequest.md +++ b/docs/PatchedStaticDeviceRequest.md @@ -4,7 +4,8 @@ ## Properties Name | Type | Description | Notes ------------ | ------------- | ------------- | ------------- -**name** | **kotlin.String** | The human-readable name of this device. | [optional] +**pk** | **kotlin.String** | | [optional] +**name** | **kotlin.String** | | [optional] diff --git a/docs/PatchedTOTPDeviceRequest.md b/docs/PatchedTOTPDeviceRequest.md index 20f0ad8..8c009ab 100644 --- a/docs/PatchedTOTPDeviceRequest.md +++ b/docs/PatchedTOTPDeviceRequest.md @@ -4,7 +4,8 @@ ## Properties Name | Type | Description | Notes ------------ | ------------- | ------------- | ------------- -**name** | **kotlin.String** | The human-readable name of this device. | [optional] +**pk** | **kotlin.String** | | [optional] +**name** | **kotlin.String** | | [optional] diff --git a/docs/PatchedWebAuthnDeviceRequest.md b/docs/PatchedWebAuthnDeviceRequest.md index d57ab82..c9caabc 100644 --- a/docs/PatchedWebAuthnDeviceRequest.md +++ b/docs/PatchedWebAuthnDeviceRequest.md @@ -4,6 +4,7 @@ ## Properties Name | Type | Description | Notes ------------ | ------------- | ------------- | ------------- +**pk** | **kotlin.String** | | [optional] **name** | **kotlin.String** | | [optional] diff --git a/docs/PlatformEnum.md b/docs/PlatformEnum.md new file mode 100644 index 0000000..94e0ec2 --- /dev/null +++ b/docs/PlatformEnum.md @@ -0,0 +1,16 @@ + +# PlatformEnum + +## Enum + + + * `ios` (value: `"ios"`) + + * `android` (value: `"android"`) + + * `other` (value: `"other"`) + + * `unknownDefaultOpenApi` (value: `"unknown_default_open_api"`) + + + diff --git a/docs/ProvidersApi.md b/docs/ProvidersApi.md index 0d9103f..2f0cbd6 100644 --- a/docs/ProvidersApi.md +++ b/docs/ProvidersApi.md @@ -939,7 +939,7 @@ Configure authentik: # **providersOauth2PreviewUserRetrieve** -> PropertyMappingPreview providersOauth2PreviewUserRetrieve(id) +> PropertyMappingPreview providersOauth2PreviewUserRetrieve(id, forUser) @@ -953,8 +953,9 @@ Preview user data for provider val apiInstance = ProvidersApi() val id : kotlin.Int = 56 // kotlin.Int | A unique integer value identifying this OAuth2/OpenID Provider. +val forUser : kotlin.Int = 56 // kotlin.Int | try { - val result : PropertyMappingPreview = apiInstance.providersOauth2PreviewUserRetrieve(id) + val result : PropertyMappingPreview = apiInstance.providersOauth2PreviewUserRetrieve(id, forUser) println(result) } catch (e: ClientException) { println("4xx response calling ProvidersApi#providersOauth2PreviewUserRetrieve") @@ -970,6 +971,7 @@ try { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **id** | **kotlin.Int**| A unique integer value identifying this OAuth2/OpenID Provider. | + **forUser** | **kotlin.Int**| | [optional] ### Return type @@ -2664,7 +2666,7 @@ Configure authentik: # **providersSamlPreviewUserRetrieve** -> PropertyMappingPreview providersSamlPreviewUserRetrieve(id) +> PropertyMappingPreview providersSamlPreviewUserRetrieve(id, forUser) @@ -2678,8 +2680,9 @@ Preview user data for provider val apiInstance = ProvidersApi() val id : kotlin.Int = 56 // kotlin.Int | A unique integer value identifying this SAML Provider. +val forUser : kotlin.Int = 56 // kotlin.Int | try { - val result : PropertyMappingPreview = apiInstance.providersSamlPreviewUserRetrieve(id) + val result : PropertyMappingPreview = apiInstance.providersSamlPreviewUserRetrieve(id, forUser) println(result) } catch (e: ClientException) { println("4xx response calling ProvidersApi#providersSamlPreviewUserRetrieve") @@ -2695,6 +2698,7 @@ try { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **id** | **kotlin.Int**| A unique integer value identifying this SAML Provider. | + **forUser** | **kotlin.Int**| | [optional] ### Return type diff --git a/docs/RbacApi.md b/docs/RbacApi.md index d975dad..7b3712d 100644 --- a/docs/RbacApi.md +++ b/docs/RbacApi.md @@ -89,7 +89,7 @@ Get assigned object permissions for a single object //import io.goauthentik.api.models.* val apiInstance = RbacApi() -val model : kotlin.String = model_example // kotlin.String | * `authentik_tenants.domain` - Domain * `authentik_crypto.certificatekeypair` - Certificate-Key Pair * `authentik_events.event` - Event * `authentik_events.notificationtransport` - Notification Transport * `authentik_events.notification` - Notification * `authentik_events.notificationrule` - Notification Rule * `authentik_events.notificationwebhookmapping` - Webhook Mapping * `authentik_flows.flow` - Flow * `authentik_flows.flowstagebinding` - Flow Stage Binding * `authentik_outposts.dockerserviceconnection` - Docker Service-Connection * `authentik_outposts.kubernetesserviceconnection` - Kubernetes Service-Connection * `authentik_outposts.outpost` - Outpost * `authentik_policies_dummy.dummypolicy` - Dummy Policy * `authentik_policies_event_matcher.eventmatcherpolicy` - Event Matcher Policy * `authentik_policies_expiry.passwordexpirypolicy` - Password Expiry Policy * `authentik_policies_expression.expressionpolicy` - Expression Policy * `authentik_policies_password.passwordpolicy` - Password Policy * `authentik_policies_reputation.reputationpolicy` - Reputation Policy * `authentik_policies_reputation.reputation` - Reputation Score * `authentik_policies.policybinding` - Policy Binding * `authentik_providers_ldap.ldapprovider` - LDAP Provider * `authentik_providers_oauth2.scopemapping` - Scope Mapping * `authentik_providers_oauth2.oauth2provider` - OAuth2/OpenID Provider * `authentik_providers_oauth2.authorizationcode` - Authorization Code * `authentik_providers_oauth2.accesstoken` - OAuth2 Access Token * `authentik_providers_oauth2.refreshtoken` - OAuth2 Refresh Token * `authentik_providers_proxy.proxyprovider` - Proxy Provider * `authentik_providers_radius.radiusprovider` - Radius Provider * `authentik_providers_saml.samlprovider` - SAML Provider * `authentik_providers_saml.samlpropertymapping` - SAML Property Mapping * `authentik_providers_scim.scimprovider` - SCIM Provider * `authentik_providers_scim.scimmapping` - SCIM Mapping * `authentik_rbac.role` - Role * `authentik_sources_ldap.ldapsource` - LDAP Source * `authentik_sources_ldap.ldappropertymapping` - LDAP Property Mapping * `authentik_sources_oauth.oauthsource` - OAuth Source * `authentik_sources_oauth.useroauthsourceconnection` - User OAuth Source Connection * `authentik_sources_plex.plexsource` - Plex Source * `authentik_sources_plex.plexsourceconnection` - User Plex Source Connection * `authentik_sources_saml.samlsource` - SAML Source * `authentik_sources_saml.usersamlsourceconnection` - User SAML Source Connection * `authentik_stages_authenticator_duo.authenticatorduostage` - Duo Authenticator Setup Stage * `authentik_stages_authenticator_duo.duodevice` - Duo Device * `authentik_stages_authenticator_sms.authenticatorsmsstage` - SMS Authenticator Setup Stage * `authentik_stages_authenticator_sms.smsdevice` - SMS Device * `authentik_stages_authenticator_static.authenticatorstaticstage` - Static Authenticator Stage * `authentik_stages_authenticator_static.staticdevice` - Static Device * `authentik_stages_authenticator_totp.authenticatortotpstage` - TOTP Authenticator Setup Stage * `authentik_stages_authenticator_totp.totpdevice` - TOTP Device * `authentik_stages_authenticator_validate.authenticatorvalidatestage` - Authenticator Validation Stage * `authentik_stages_authenticator_webauthn.authenticatewebauthnstage` - WebAuthn Authenticator Setup Stage * `authentik_stages_authenticator_webauthn.webauthndevice` - WebAuthn Device * `authentik_stages_captcha.captchastage` - Captcha Stage * `authentik_stages_consent.consentstage` - Consent Stage * `authentik_stages_consent.userconsent` - User Consent * `authentik_stages_deny.denystage` - Deny Stage * `authentik_stages_dummy.dummystage` - Dummy Stage * `authentik_stages_email.emailstage` - Email Stage * `authentik_stages_identification.identificationstage` - Identification Stage * `authentik_stages_invitation.invitationstage` - Invitation Stage * `authentik_stages_invitation.invitation` - Invitation * `authentik_stages_password.passwordstage` - Password Stage * `authentik_stages_prompt.prompt` - Prompt * `authentik_stages_prompt.promptstage` - Prompt Stage * `authentik_stages_user_delete.userdeletestage` - User Delete Stage * `authentik_stages_user_login.userloginstage` - User Login Stage * `authentik_stages_user_logout.userlogoutstage` - User Logout Stage * `authentik_stages_user_write.userwritestage` - User Write Stage * `authentik_brands.brand` - Brand * `authentik_blueprints.blueprintinstance` - Blueprint Instance * `authentik_core.group` - Group * `authentik_core.user` - User * `authentik_core.application` - Application * `authentik_core.token` - Token * `authentik_enterprise.license` - License * `authentik_providers_rac.racprovider` - RAC Provider * `authentik_providers_rac.endpoint` - RAC Endpoint * `authentik_providers_rac.racpropertymapping` - RAC Property Mapping +val model : kotlin.String = model_example // kotlin.String | * `authentik_tenants.domain` - Domain * `authentik_crypto.certificatekeypair` - Certificate-Key Pair * `authentik_events.event` - Event * `authentik_events.notificationtransport` - Notification Transport * `authentik_events.notification` - Notification * `authentik_events.notificationrule` - Notification Rule * `authentik_events.notificationwebhookmapping` - Webhook Mapping * `authentik_flows.flow` - Flow * `authentik_flows.flowstagebinding` - Flow Stage Binding * `authentik_outposts.dockerserviceconnection` - Docker Service-Connection * `authentik_outposts.kubernetesserviceconnection` - Kubernetes Service-Connection * `authentik_outposts.outpost` - Outpost * `authentik_policies_dummy.dummypolicy` - Dummy Policy * `authentik_policies_event_matcher.eventmatcherpolicy` - Event Matcher Policy * `authentik_policies_expiry.passwordexpirypolicy` - Password Expiry Policy * `authentik_policies_expression.expressionpolicy` - Expression Policy * `authentik_policies_password.passwordpolicy` - Password Policy * `authentik_policies_reputation.reputationpolicy` - Reputation Policy * `authentik_policies.policybinding` - Policy Binding * `authentik_providers_ldap.ldapprovider` - LDAP Provider * `authentik_providers_oauth2.scopemapping` - Scope Mapping * `authentik_providers_oauth2.oauth2provider` - OAuth2/OpenID Provider * `authentik_providers_proxy.proxyprovider` - Proxy Provider * `authentik_providers_radius.radiusprovider` - Radius Provider * `authentik_providers_saml.samlprovider` - SAML Provider * `authentik_providers_saml.samlpropertymapping` - SAML Property Mapping * `authentik_providers_scim.scimprovider` - SCIM Provider * `authentik_providers_scim.scimmapping` - SCIM Mapping * `authentik_rbac.role` - Role * `authentik_sources_ldap.ldapsource` - LDAP Source * `authentik_sources_ldap.ldappropertymapping` - LDAP Property Mapping * `authentik_sources_oauth.oauthsource` - OAuth Source * `authentik_sources_oauth.useroauthsourceconnection` - User OAuth Source Connection * `authentik_sources_plex.plexsource` - Plex Source * `authentik_sources_plex.plexsourceconnection` - User Plex Source Connection * `authentik_sources_saml.samlsource` - SAML Source * `authentik_sources_saml.usersamlsourceconnection` - User SAML Source Connection * `authentik_stages_authenticator_duo.authenticatorduostage` - Duo Authenticator Setup Stage * `authentik_stages_authenticator_duo.duodevice` - Duo Device * `authentik_stages_authenticator_mobile.authenticatormobilestage` - Mobile Authenticator Setup Stage * `authentik_stages_authenticator_mobile.mobiledevice` - Mobile Device * `authentik_stages_authenticator_sms.authenticatorsmsstage` - SMS Authenticator Setup Stage * `authentik_stages_authenticator_sms.smsdevice` - SMS Device * `authentik_stages_authenticator_static.authenticatorstaticstage` - Static Authenticator Setup Stage * `authentik_stages_authenticator_static.staticdevice` - Static Device * `authentik_stages_authenticator_totp.authenticatortotpstage` - TOTP Authenticator Setup Stage * `authentik_stages_authenticator_totp.totpdevice` - TOTP Device * `authentik_stages_authenticator_validate.authenticatorvalidatestage` - Authenticator Validation Stage * `authentik_stages_authenticator_webauthn.authenticatewebauthnstage` - WebAuthn Authenticator Setup Stage * `authentik_stages_authenticator_webauthn.webauthndevice` - WebAuthn Device * `authentik_stages_captcha.captchastage` - Captcha Stage * `authentik_stages_consent.consentstage` - Consent Stage * `authentik_stages_consent.userconsent` - User Consent * `authentik_stages_deny.denystage` - Deny Stage * `authentik_stages_dummy.dummystage` - Dummy Stage * `authentik_stages_email.emailstage` - Email Stage * `authentik_stages_identification.identificationstage` - Identification Stage * `authentik_stages_invitation.invitationstage` - Invitation Stage * `authentik_stages_invitation.invitation` - Invitation * `authentik_stages_password.passwordstage` - Password Stage * `authentik_stages_prompt.prompt` - Prompt * `authentik_stages_prompt.promptstage` - Prompt Stage * `authentik_stages_user_delete.userdeletestage` - User Delete Stage * `authentik_stages_user_login.userloginstage` - User Login Stage * `authentik_stages_user_logout.userlogoutstage` - User Logout Stage * `authentik_stages_user_write.userwritestage` - User Write Stage * `authentik_brands.brand` - Brand * `authentik_blueprints.blueprintinstance` - Blueprint Instance * `authentik_core.group` - Group * `authentik_core.user` - User * `authentik_core.application` - Application * `authentik_core.token` - Token * `authentik_enterprise.license` - License * `authentik_providers_rac.racprovider` - RAC Provider * `authentik_providers_rac.endpoint` - RAC Endpoint * `authentik_providers_rac.racpropertymapping` - RAC Property Mapping val objectPk : kotlin.String = objectPk_example // kotlin.String | val ordering : kotlin.String = ordering_example // kotlin.String | Which field to use when ordering the results. val page : kotlin.Int = 56 // kotlin.Int | A page number within the paginated result set. @@ -111,7 +111,7 @@ try { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - **model** | **kotlin.String**| * `authentik_tenants.domain` - Domain * `authentik_crypto.certificatekeypair` - Certificate-Key Pair * `authentik_events.event` - Event * `authentik_events.notificationtransport` - Notification Transport * `authentik_events.notification` - Notification * `authentik_events.notificationrule` - Notification Rule * `authentik_events.notificationwebhookmapping` - Webhook Mapping * `authentik_flows.flow` - Flow * `authentik_flows.flowstagebinding` - Flow Stage Binding * `authentik_outposts.dockerserviceconnection` - Docker Service-Connection * `authentik_outposts.kubernetesserviceconnection` - Kubernetes Service-Connection * `authentik_outposts.outpost` - Outpost * `authentik_policies_dummy.dummypolicy` - Dummy Policy * `authentik_policies_event_matcher.eventmatcherpolicy` - Event Matcher Policy * `authentik_policies_expiry.passwordexpirypolicy` - Password Expiry Policy * `authentik_policies_expression.expressionpolicy` - Expression Policy * `authentik_policies_password.passwordpolicy` - Password Policy * `authentik_policies_reputation.reputationpolicy` - Reputation Policy * `authentik_policies_reputation.reputation` - Reputation Score * `authentik_policies.policybinding` - Policy Binding * `authentik_providers_ldap.ldapprovider` - LDAP Provider * `authentik_providers_oauth2.scopemapping` - Scope Mapping * `authentik_providers_oauth2.oauth2provider` - OAuth2/OpenID Provider * `authentik_providers_oauth2.authorizationcode` - Authorization Code * `authentik_providers_oauth2.accesstoken` - OAuth2 Access Token * `authentik_providers_oauth2.refreshtoken` - OAuth2 Refresh Token * `authentik_providers_proxy.proxyprovider` - Proxy Provider * `authentik_providers_radius.radiusprovider` - Radius Provider * `authentik_providers_saml.samlprovider` - SAML Provider * `authentik_providers_saml.samlpropertymapping` - SAML Property Mapping * `authentik_providers_scim.scimprovider` - SCIM Provider * `authentik_providers_scim.scimmapping` - SCIM Mapping * `authentik_rbac.role` - Role * `authentik_sources_ldap.ldapsource` - LDAP Source * `authentik_sources_ldap.ldappropertymapping` - LDAP Property Mapping * `authentik_sources_oauth.oauthsource` - OAuth Source * `authentik_sources_oauth.useroauthsourceconnection` - User OAuth Source Connection * `authentik_sources_plex.plexsource` - Plex Source * `authentik_sources_plex.plexsourceconnection` - User Plex Source Connection * `authentik_sources_saml.samlsource` - SAML Source * `authentik_sources_saml.usersamlsourceconnection` - User SAML Source Connection * `authentik_stages_authenticator_duo.authenticatorduostage` - Duo Authenticator Setup Stage * `authentik_stages_authenticator_duo.duodevice` - Duo Device * `authentik_stages_authenticator_sms.authenticatorsmsstage` - SMS Authenticator Setup Stage * `authentik_stages_authenticator_sms.smsdevice` - SMS Device * `authentik_stages_authenticator_static.authenticatorstaticstage` - Static Authenticator Stage * `authentik_stages_authenticator_static.staticdevice` - Static Device * `authentik_stages_authenticator_totp.authenticatortotpstage` - TOTP Authenticator Setup Stage * `authentik_stages_authenticator_totp.totpdevice` - TOTP Device * `authentik_stages_authenticator_validate.authenticatorvalidatestage` - Authenticator Validation Stage * `authentik_stages_authenticator_webauthn.authenticatewebauthnstage` - WebAuthn Authenticator Setup Stage * `authentik_stages_authenticator_webauthn.webauthndevice` - WebAuthn Device * `authentik_stages_captcha.captchastage` - Captcha Stage * `authentik_stages_consent.consentstage` - Consent Stage * `authentik_stages_consent.userconsent` - User Consent * `authentik_stages_deny.denystage` - Deny Stage * `authentik_stages_dummy.dummystage` - Dummy Stage * `authentik_stages_email.emailstage` - Email Stage * `authentik_stages_identification.identificationstage` - Identification Stage * `authentik_stages_invitation.invitationstage` - Invitation Stage * `authentik_stages_invitation.invitation` - Invitation * `authentik_stages_password.passwordstage` - Password Stage * `authentik_stages_prompt.prompt` - Prompt * `authentik_stages_prompt.promptstage` - Prompt Stage * `authentik_stages_user_delete.userdeletestage` - User Delete Stage * `authentik_stages_user_login.userloginstage` - User Login Stage * `authentik_stages_user_logout.userlogoutstage` - User Logout Stage * `authentik_stages_user_write.userwritestage` - User Write Stage * `authentik_brands.brand` - Brand * `authentik_blueprints.blueprintinstance` - Blueprint Instance * `authentik_core.group` - Group * `authentik_core.user` - User * `authentik_core.application` - Application * `authentik_core.token` - Token * `authentik_enterprise.license` - License * `authentik_providers_rac.racprovider` - RAC Provider * `authentik_providers_rac.endpoint` - RAC Endpoint * `authentik_providers_rac.racpropertymapping` - RAC Property Mapping | [enum: authentik_blueprints.blueprintinstance, authentik_brands.brand, authentik_core.application, authentik_core.group, authentik_core.token, authentik_core.user, authentik_crypto.certificatekeypair, authentik_enterprise.license, authentik_events.event, authentik_events.notification, authentik_events.notificationrule, authentik_events.notificationtransport, authentik_events.notificationwebhookmapping, authentik_flows.flow, authentik_flows.flowstagebinding, authentik_outposts.dockerserviceconnection, authentik_outposts.kubernetesserviceconnection, authentik_outposts.outpost, authentik_policies.policybinding, authentik_policies_dummy.dummypolicy, authentik_policies_event_matcher.eventmatcherpolicy, authentik_policies_expiry.passwordexpirypolicy, authentik_policies_expression.expressionpolicy, authentik_policies_password.passwordpolicy, authentik_policies_reputation.reputation, authentik_policies_reputation.reputationpolicy, authentik_providers_ldap.ldapprovider, authentik_providers_oauth2.accesstoken, authentik_providers_oauth2.authorizationcode, authentik_providers_oauth2.oauth2provider, authentik_providers_oauth2.refreshtoken, authentik_providers_oauth2.scopemapping, authentik_providers_proxy.proxyprovider, authentik_providers_rac.endpoint, authentik_providers_rac.racpropertymapping, authentik_providers_rac.racprovider, authentik_providers_radius.radiusprovider, authentik_providers_saml.samlpropertymapping, authentik_providers_saml.samlprovider, authentik_providers_scim.scimmapping, authentik_providers_scim.scimprovider, authentik_rbac.role, authentik_sources_ldap.ldappropertymapping, authentik_sources_ldap.ldapsource, authentik_sources_oauth.oauthsource, authentik_sources_oauth.useroauthsourceconnection, authentik_sources_plex.plexsource, authentik_sources_plex.plexsourceconnection, authentik_sources_saml.samlsource, authentik_sources_saml.usersamlsourceconnection, authentik_stages_authenticator_duo.authenticatorduostage, authentik_stages_authenticator_duo.duodevice, authentik_stages_authenticator_sms.authenticatorsmsstage, authentik_stages_authenticator_sms.smsdevice, authentik_stages_authenticator_static.authenticatorstaticstage, authentik_stages_authenticator_static.staticdevice, authentik_stages_authenticator_totp.authenticatortotpstage, authentik_stages_authenticator_totp.totpdevice, authentik_stages_authenticator_validate.authenticatorvalidatestage, authentik_stages_authenticator_webauthn.authenticatewebauthnstage, authentik_stages_authenticator_webauthn.webauthndevice, authentik_stages_captcha.captchastage, authentik_stages_consent.consentstage, authentik_stages_consent.userconsent, authentik_stages_deny.denystage, authentik_stages_dummy.dummystage, authentik_stages_email.emailstage, authentik_stages_identification.identificationstage, authentik_stages_invitation.invitation, authentik_stages_invitation.invitationstage, authentik_stages_password.passwordstage, authentik_stages_prompt.prompt, authentik_stages_prompt.promptstage, authentik_stages_user_delete.userdeletestage, authentik_stages_user_login.userloginstage, authentik_stages_user_logout.userlogoutstage, authentik_stages_user_write.userwritestage, authentik_tenants.domain] + **model** | **kotlin.String**| * `authentik_tenants.domain` - Domain * `authentik_crypto.certificatekeypair` - Certificate-Key Pair * `authentik_events.event` - Event * `authentik_events.notificationtransport` - Notification Transport * `authentik_events.notification` - Notification * `authentik_events.notificationrule` - Notification Rule * `authentik_events.notificationwebhookmapping` - Webhook Mapping * `authentik_flows.flow` - Flow * `authentik_flows.flowstagebinding` - Flow Stage Binding * `authentik_outposts.dockerserviceconnection` - Docker Service-Connection * `authentik_outposts.kubernetesserviceconnection` - Kubernetes Service-Connection * `authentik_outposts.outpost` - Outpost * `authentik_policies_dummy.dummypolicy` - Dummy Policy * `authentik_policies_event_matcher.eventmatcherpolicy` - Event Matcher Policy * `authentik_policies_expiry.passwordexpirypolicy` - Password Expiry Policy * `authentik_policies_expression.expressionpolicy` - Expression Policy * `authentik_policies_password.passwordpolicy` - Password Policy * `authentik_policies_reputation.reputationpolicy` - Reputation Policy * `authentik_policies.policybinding` - Policy Binding * `authentik_providers_ldap.ldapprovider` - LDAP Provider * `authentik_providers_oauth2.scopemapping` - Scope Mapping * `authentik_providers_oauth2.oauth2provider` - OAuth2/OpenID Provider * `authentik_providers_proxy.proxyprovider` - Proxy Provider * `authentik_providers_radius.radiusprovider` - Radius Provider * `authentik_providers_saml.samlprovider` - SAML Provider * `authentik_providers_saml.samlpropertymapping` - SAML Property Mapping * `authentik_providers_scim.scimprovider` - SCIM Provider * `authentik_providers_scim.scimmapping` - SCIM Mapping * `authentik_rbac.role` - Role * `authentik_sources_ldap.ldapsource` - LDAP Source * `authentik_sources_ldap.ldappropertymapping` - LDAP Property Mapping * `authentik_sources_oauth.oauthsource` - OAuth Source * `authentik_sources_oauth.useroauthsourceconnection` - User OAuth Source Connection * `authentik_sources_plex.plexsource` - Plex Source * `authentik_sources_plex.plexsourceconnection` - User Plex Source Connection * `authentik_sources_saml.samlsource` - SAML Source * `authentik_sources_saml.usersamlsourceconnection` - User SAML Source Connection * `authentik_stages_authenticator_duo.authenticatorduostage` - Duo Authenticator Setup Stage * `authentik_stages_authenticator_duo.duodevice` - Duo Device * `authentik_stages_authenticator_mobile.authenticatormobilestage` - Mobile Authenticator Setup Stage * `authentik_stages_authenticator_mobile.mobiledevice` - Mobile Device * `authentik_stages_authenticator_sms.authenticatorsmsstage` - SMS Authenticator Setup Stage * `authentik_stages_authenticator_sms.smsdevice` - SMS Device * `authentik_stages_authenticator_static.authenticatorstaticstage` - Static Authenticator Setup Stage * `authentik_stages_authenticator_static.staticdevice` - Static Device * `authentik_stages_authenticator_totp.authenticatortotpstage` - TOTP Authenticator Setup Stage * `authentik_stages_authenticator_totp.totpdevice` - TOTP Device * `authentik_stages_authenticator_validate.authenticatorvalidatestage` - Authenticator Validation Stage * `authentik_stages_authenticator_webauthn.authenticatewebauthnstage` - WebAuthn Authenticator Setup Stage * `authentik_stages_authenticator_webauthn.webauthndevice` - WebAuthn Device * `authentik_stages_captcha.captchastage` - Captcha Stage * `authentik_stages_consent.consentstage` - Consent Stage * `authentik_stages_consent.userconsent` - User Consent * `authentik_stages_deny.denystage` - Deny Stage * `authentik_stages_dummy.dummystage` - Dummy Stage * `authentik_stages_email.emailstage` - Email Stage * `authentik_stages_identification.identificationstage` - Identification Stage * `authentik_stages_invitation.invitationstage` - Invitation Stage * `authentik_stages_invitation.invitation` - Invitation * `authentik_stages_password.passwordstage` - Password Stage * `authentik_stages_prompt.prompt` - Prompt * `authentik_stages_prompt.promptstage` - Prompt Stage * `authentik_stages_user_delete.userdeletestage` - User Delete Stage * `authentik_stages_user_login.userloginstage` - User Login Stage * `authentik_stages_user_logout.userlogoutstage` - User Logout Stage * `authentik_stages_user_write.userwritestage` - User Write Stage * `authentik_brands.brand` - Brand * `authentik_blueprints.blueprintinstance` - Blueprint Instance * `authentik_core.group` - Group * `authentik_core.user` - User * `authentik_core.application` - Application * `authentik_core.token` - Token * `authentik_enterprise.license` - License * `authentik_providers_rac.racprovider` - RAC Provider * `authentik_providers_rac.endpoint` - RAC Endpoint * `authentik_providers_rac.racpropertymapping` - RAC Property Mapping | [enum: authentik_blueprints.blueprintinstance, authentik_brands.brand, authentik_core.application, authentik_core.group, authentik_core.token, authentik_core.user, authentik_crypto.certificatekeypair, authentik_enterprise.license, authentik_events.event, authentik_events.notification, authentik_events.notificationrule, authentik_events.notificationtransport, authentik_events.notificationwebhookmapping, authentik_flows.flow, authentik_flows.flowstagebinding, authentik_outposts.dockerserviceconnection, authentik_outposts.kubernetesserviceconnection, authentik_outposts.outpost, authentik_policies.policybinding, authentik_policies_dummy.dummypolicy, authentik_policies_event_matcher.eventmatcherpolicy, authentik_policies_expiry.passwordexpirypolicy, authentik_policies_expression.expressionpolicy, authentik_policies_password.passwordpolicy, authentik_policies_reputation.reputationpolicy, authentik_providers_ldap.ldapprovider, authentik_providers_oauth2.oauth2provider, authentik_providers_oauth2.scopemapping, authentik_providers_proxy.proxyprovider, authentik_providers_rac.endpoint, authentik_providers_rac.racpropertymapping, authentik_providers_rac.racprovider, authentik_providers_radius.radiusprovider, authentik_providers_saml.samlpropertymapping, authentik_providers_saml.samlprovider, authentik_providers_scim.scimmapping, authentik_providers_scim.scimprovider, authentik_rbac.role, authentik_sources_ldap.ldappropertymapping, authentik_sources_ldap.ldapsource, authentik_sources_oauth.oauthsource, authentik_sources_oauth.useroauthsourceconnection, authentik_sources_plex.plexsource, authentik_sources_plex.plexsourceconnection, authentik_sources_saml.samlsource, authentik_sources_saml.usersamlsourceconnection, authentik_stages_authenticator_duo.authenticatorduostage, authentik_stages_authenticator_duo.duodevice, authentik_stages_authenticator_mobile.authenticatormobilestage, authentik_stages_authenticator_mobile.mobiledevice, authentik_stages_authenticator_sms.authenticatorsmsstage, authentik_stages_authenticator_sms.smsdevice, authentik_stages_authenticator_static.authenticatorstaticstage, authentik_stages_authenticator_static.staticdevice, authentik_stages_authenticator_totp.authenticatortotpstage, authentik_stages_authenticator_totp.totpdevice, authentik_stages_authenticator_validate.authenticatorvalidatestage, authentik_stages_authenticator_webauthn.authenticatewebauthnstage, authentik_stages_authenticator_webauthn.webauthndevice, authentik_stages_captcha.captchastage, authentik_stages_consent.consentstage, authentik_stages_consent.userconsent, authentik_stages_deny.denystage, authentik_stages_dummy.dummystage, authentik_stages_email.emailstage, authentik_stages_identification.identificationstage, authentik_stages_invitation.invitation, authentik_stages_invitation.invitationstage, authentik_stages_password.passwordstage, authentik_stages_prompt.prompt, authentik_stages_prompt.promptstage, authentik_stages_user_delete.userdeletestage, authentik_stages_user_login.userloginstage, authentik_stages_user_logout.userlogoutstage, authentik_stages_user_write.userwritestage, authentik_tenants.domain] **objectPk** | **kotlin.String**| | [optional] **ordering** | **kotlin.String**| Which field to use when ordering the results. | [optional] **page** | **kotlin.Int**| A page number within the paginated result set. | [optional] @@ -251,7 +251,7 @@ Get assigned object permissions for a single object //import io.goauthentik.api.models.* val apiInstance = RbacApi() -val model : kotlin.String = model_example // kotlin.String | * `authentik_tenants.domain` - Domain * `authentik_crypto.certificatekeypair` - Certificate-Key Pair * `authentik_events.event` - Event * `authentik_events.notificationtransport` - Notification Transport * `authentik_events.notification` - Notification * `authentik_events.notificationrule` - Notification Rule * `authentik_events.notificationwebhookmapping` - Webhook Mapping * `authentik_flows.flow` - Flow * `authentik_flows.flowstagebinding` - Flow Stage Binding * `authentik_outposts.dockerserviceconnection` - Docker Service-Connection * `authentik_outposts.kubernetesserviceconnection` - Kubernetes Service-Connection * `authentik_outposts.outpost` - Outpost * `authentik_policies_dummy.dummypolicy` - Dummy Policy * `authentik_policies_event_matcher.eventmatcherpolicy` - Event Matcher Policy * `authentik_policies_expiry.passwordexpirypolicy` - Password Expiry Policy * `authentik_policies_expression.expressionpolicy` - Expression Policy * `authentik_policies_password.passwordpolicy` - Password Policy * `authentik_policies_reputation.reputationpolicy` - Reputation Policy * `authentik_policies_reputation.reputation` - Reputation Score * `authentik_policies.policybinding` - Policy Binding * `authentik_providers_ldap.ldapprovider` - LDAP Provider * `authentik_providers_oauth2.scopemapping` - Scope Mapping * `authentik_providers_oauth2.oauth2provider` - OAuth2/OpenID Provider * `authentik_providers_oauth2.authorizationcode` - Authorization Code * `authentik_providers_oauth2.accesstoken` - OAuth2 Access Token * `authentik_providers_oauth2.refreshtoken` - OAuth2 Refresh Token * `authentik_providers_proxy.proxyprovider` - Proxy Provider * `authentik_providers_radius.radiusprovider` - Radius Provider * `authentik_providers_saml.samlprovider` - SAML Provider * `authentik_providers_saml.samlpropertymapping` - SAML Property Mapping * `authentik_providers_scim.scimprovider` - SCIM Provider * `authentik_providers_scim.scimmapping` - SCIM Mapping * `authentik_rbac.role` - Role * `authentik_sources_ldap.ldapsource` - LDAP Source * `authentik_sources_ldap.ldappropertymapping` - LDAP Property Mapping * `authentik_sources_oauth.oauthsource` - OAuth Source * `authentik_sources_oauth.useroauthsourceconnection` - User OAuth Source Connection * `authentik_sources_plex.plexsource` - Plex Source * `authentik_sources_plex.plexsourceconnection` - User Plex Source Connection * `authentik_sources_saml.samlsource` - SAML Source * `authentik_sources_saml.usersamlsourceconnection` - User SAML Source Connection * `authentik_stages_authenticator_duo.authenticatorduostage` - Duo Authenticator Setup Stage * `authentik_stages_authenticator_duo.duodevice` - Duo Device * `authentik_stages_authenticator_sms.authenticatorsmsstage` - SMS Authenticator Setup Stage * `authentik_stages_authenticator_sms.smsdevice` - SMS Device * `authentik_stages_authenticator_static.authenticatorstaticstage` - Static Authenticator Stage * `authentik_stages_authenticator_static.staticdevice` - Static Device * `authentik_stages_authenticator_totp.authenticatortotpstage` - TOTP Authenticator Setup Stage * `authentik_stages_authenticator_totp.totpdevice` - TOTP Device * `authentik_stages_authenticator_validate.authenticatorvalidatestage` - Authenticator Validation Stage * `authentik_stages_authenticator_webauthn.authenticatewebauthnstage` - WebAuthn Authenticator Setup Stage * `authentik_stages_authenticator_webauthn.webauthndevice` - WebAuthn Device * `authentik_stages_captcha.captchastage` - Captcha Stage * `authentik_stages_consent.consentstage` - Consent Stage * `authentik_stages_consent.userconsent` - User Consent * `authentik_stages_deny.denystage` - Deny Stage * `authentik_stages_dummy.dummystage` - Dummy Stage * `authentik_stages_email.emailstage` - Email Stage * `authentik_stages_identification.identificationstage` - Identification Stage * `authentik_stages_invitation.invitationstage` - Invitation Stage * `authentik_stages_invitation.invitation` - Invitation * `authentik_stages_password.passwordstage` - Password Stage * `authentik_stages_prompt.prompt` - Prompt * `authentik_stages_prompt.promptstage` - Prompt Stage * `authentik_stages_user_delete.userdeletestage` - User Delete Stage * `authentik_stages_user_login.userloginstage` - User Login Stage * `authentik_stages_user_logout.userlogoutstage` - User Logout Stage * `authentik_stages_user_write.userwritestage` - User Write Stage * `authentik_brands.brand` - Brand * `authentik_blueprints.blueprintinstance` - Blueprint Instance * `authentik_core.group` - Group * `authentik_core.user` - User * `authentik_core.application` - Application * `authentik_core.token` - Token * `authentik_enterprise.license` - License * `authentik_providers_rac.racprovider` - RAC Provider * `authentik_providers_rac.endpoint` - RAC Endpoint * `authentik_providers_rac.racpropertymapping` - RAC Property Mapping +val model : kotlin.String = model_example // kotlin.String | * `authentik_tenants.domain` - Domain * `authentik_crypto.certificatekeypair` - Certificate-Key Pair * `authentik_events.event` - Event * `authentik_events.notificationtransport` - Notification Transport * `authentik_events.notification` - Notification * `authentik_events.notificationrule` - Notification Rule * `authentik_events.notificationwebhookmapping` - Webhook Mapping * `authentik_flows.flow` - Flow * `authentik_flows.flowstagebinding` - Flow Stage Binding * `authentik_outposts.dockerserviceconnection` - Docker Service-Connection * `authentik_outposts.kubernetesserviceconnection` - Kubernetes Service-Connection * `authentik_outposts.outpost` - Outpost * `authentik_policies_dummy.dummypolicy` - Dummy Policy * `authentik_policies_event_matcher.eventmatcherpolicy` - Event Matcher Policy * `authentik_policies_expiry.passwordexpirypolicy` - Password Expiry Policy * `authentik_policies_expression.expressionpolicy` - Expression Policy * `authentik_policies_password.passwordpolicy` - Password Policy * `authentik_policies_reputation.reputationpolicy` - Reputation Policy * `authentik_policies.policybinding` - Policy Binding * `authentik_providers_ldap.ldapprovider` - LDAP Provider * `authentik_providers_oauth2.scopemapping` - Scope Mapping * `authentik_providers_oauth2.oauth2provider` - OAuth2/OpenID Provider * `authentik_providers_proxy.proxyprovider` - Proxy Provider * `authentik_providers_radius.radiusprovider` - Radius Provider * `authentik_providers_saml.samlprovider` - SAML Provider * `authentik_providers_saml.samlpropertymapping` - SAML Property Mapping * `authentik_providers_scim.scimprovider` - SCIM Provider * `authentik_providers_scim.scimmapping` - SCIM Mapping * `authentik_rbac.role` - Role * `authentik_sources_ldap.ldapsource` - LDAP Source * `authentik_sources_ldap.ldappropertymapping` - LDAP Property Mapping * `authentik_sources_oauth.oauthsource` - OAuth Source * `authentik_sources_oauth.useroauthsourceconnection` - User OAuth Source Connection * `authentik_sources_plex.plexsource` - Plex Source * `authentik_sources_plex.plexsourceconnection` - User Plex Source Connection * `authentik_sources_saml.samlsource` - SAML Source * `authentik_sources_saml.usersamlsourceconnection` - User SAML Source Connection * `authentik_stages_authenticator_duo.authenticatorduostage` - Duo Authenticator Setup Stage * `authentik_stages_authenticator_duo.duodevice` - Duo Device * `authentik_stages_authenticator_mobile.authenticatormobilestage` - Mobile Authenticator Setup Stage * `authentik_stages_authenticator_mobile.mobiledevice` - Mobile Device * `authentik_stages_authenticator_sms.authenticatorsmsstage` - SMS Authenticator Setup Stage * `authentik_stages_authenticator_sms.smsdevice` - SMS Device * `authentik_stages_authenticator_static.authenticatorstaticstage` - Static Authenticator Setup Stage * `authentik_stages_authenticator_static.staticdevice` - Static Device * `authentik_stages_authenticator_totp.authenticatortotpstage` - TOTP Authenticator Setup Stage * `authentik_stages_authenticator_totp.totpdevice` - TOTP Device * `authentik_stages_authenticator_validate.authenticatorvalidatestage` - Authenticator Validation Stage * `authentik_stages_authenticator_webauthn.authenticatewebauthnstage` - WebAuthn Authenticator Setup Stage * `authentik_stages_authenticator_webauthn.webauthndevice` - WebAuthn Device * `authentik_stages_captcha.captchastage` - Captcha Stage * `authentik_stages_consent.consentstage` - Consent Stage * `authentik_stages_consent.userconsent` - User Consent * `authentik_stages_deny.denystage` - Deny Stage * `authentik_stages_dummy.dummystage` - Dummy Stage * `authentik_stages_email.emailstage` - Email Stage * `authentik_stages_identification.identificationstage` - Identification Stage * `authentik_stages_invitation.invitationstage` - Invitation Stage * `authentik_stages_invitation.invitation` - Invitation * `authentik_stages_password.passwordstage` - Password Stage * `authentik_stages_prompt.prompt` - Prompt * `authentik_stages_prompt.promptstage` - Prompt Stage * `authentik_stages_user_delete.userdeletestage` - User Delete Stage * `authentik_stages_user_login.userloginstage` - User Login Stage * `authentik_stages_user_logout.userlogoutstage` - User Logout Stage * `authentik_stages_user_write.userwritestage` - User Write Stage * `authentik_brands.brand` - Brand * `authentik_blueprints.blueprintinstance` - Blueprint Instance * `authentik_core.group` - Group * `authentik_core.user` - User * `authentik_core.application` - Application * `authentik_core.token` - Token * `authentik_enterprise.license` - License * `authentik_providers_rac.racprovider` - RAC Provider * `authentik_providers_rac.endpoint` - RAC Endpoint * `authentik_providers_rac.racpropertymapping` - RAC Property Mapping val objectPk : kotlin.String = objectPk_example // kotlin.String | val ordering : kotlin.String = ordering_example // kotlin.String | Which field to use when ordering the results. val page : kotlin.Int = 56 // kotlin.Int | A page number within the paginated result set. @@ -273,7 +273,7 @@ try { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - **model** | **kotlin.String**| * `authentik_tenants.domain` - Domain * `authentik_crypto.certificatekeypair` - Certificate-Key Pair * `authentik_events.event` - Event * `authentik_events.notificationtransport` - Notification Transport * `authentik_events.notification` - Notification * `authentik_events.notificationrule` - Notification Rule * `authentik_events.notificationwebhookmapping` - Webhook Mapping * `authentik_flows.flow` - Flow * `authentik_flows.flowstagebinding` - Flow Stage Binding * `authentik_outposts.dockerserviceconnection` - Docker Service-Connection * `authentik_outposts.kubernetesserviceconnection` - Kubernetes Service-Connection * `authentik_outposts.outpost` - Outpost * `authentik_policies_dummy.dummypolicy` - Dummy Policy * `authentik_policies_event_matcher.eventmatcherpolicy` - Event Matcher Policy * `authentik_policies_expiry.passwordexpirypolicy` - Password Expiry Policy * `authentik_policies_expression.expressionpolicy` - Expression Policy * `authentik_policies_password.passwordpolicy` - Password Policy * `authentik_policies_reputation.reputationpolicy` - Reputation Policy * `authentik_policies_reputation.reputation` - Reputation Score * `authentik_policies.policybinding` - Policy Binding * `authentik_providers_ldap.ldapprovider` - LDAP Provider * `authentik_providers_oauth2.scopemapping` - Scope Mapping * `authentik_providers_oauth2.oauth2provider` - OAuth2/OpenID Provider * `authentik_providers_oauth2.authorizationcode` - Authorization Code * `authentik_providers_oauth2.accesstoken` - OAuth2 Access Token * `authentik_providers_oauth2.refreshtoken` - OAuth2 Refresh Token * `authentik_providers_proxy.proxyprovider` - Proxy Provider * `authentik_providers_radius.radiusprovider` - Radius Provider * `authentik_providers_saml.samlprovider` - SAML Provider * `authentik_providers_saml.samlpropertymapping` - SAML Property Mapping * `authentik_providers_scim.scimprovider` - SCIM Provider * `authentik_providers_scim.scimmapping` - SCIM Mapping * `authentik_rbac.role` - Role * `authentik_sources_ldap.ldapsource` - LDAP Source * `authentik_sources_ldap.ldappropertymapping` - LDAP Property Mapping * `authentik_sources_oauth.oauthsource` - OAuth Source * `authentik_sources_oauth.useroauthsourceconnection` - User OAuth Source Connection * `authentik_sources_plex.plexsource` - Plex Source * `authentik_sources_plex.plexsourceconnection` - User Plex Source Connection * `authentik_sources_saml.samlsource` - SAML Source * `authentik_sources_saml.usersamlsourceconnection` - User SAML Source Connection * `authentik_stages_authenticator_duo.authenticatorduostage` - Duo Authenticator Setup Stage * `authentik_stages_authenticator_duo.duodevice` - Duo Device * `authentik_stages_authenticator_sms.authenticatorsmsstage` - SMS Authenticator Setup Stage * `authentik_stages_authenticator_sms.smsdevice` - SMS Device * `authentik_stages_authenticator_static.authenticatorstaticstage` - Static Authenticator Stage * `authentik_stages_authenticator_static.staticdevice` - Static Device * `authentik_stages_authenticator_totp.authenticatortotpstage` - TOTP Authenticator Setup Stage * `authentik_stages_authenticator_totp.totpdevice` - TOTP Device * `authentik_stages_authenticator_validate.authenticatorvalidatestage` - Authenticator Validation Stage * `authentik_stages_authenticator_webauthn.authenticatewebauthnstage` - WebAuthn Authenticator Setup Stage * `authentik_stages_authenticator_webauthn.webauthndevice` - WebAuthn Device * `authentik_stages_captcha.captchastage` - Captcha Stage * `authentik_stages_consent.consentstage` - Consent Stage * `authentik_stages_consent.userconsent` - User Consent * `authentik_stages_deny.denystage` - Deny Stage * `authentik_stages_dummy.dummystage` - Dummy Stage * `authentik_stages_email.emailstage` - Email Stage * `authentik_stages_identification.identificationstage` - Identification Stage * `authentik_stages_invitation.invitationstage` - Invitation Stage * `authentik_stages_invitation.invitation` - Invitation * `authentik_stages_password.passwordstage` - Password Stage * `authentik_stages_prompt.prompt` - Prompt * `authentik_stages_prompt.promptstage` - Prompt Stage * `authentik_stages_user_delete.userdeletestage` - User Delete Stage * `authentik_stages_user_login.userloginstage` - User Login Stage * `authentik_stages_user_logout.userlogoutstage` - User Logout Stage * `authentik_stages_user_write.userwritestage` - User Write Stage * `authentik_brands.brand` - Brand * `authentik_blueprints.blueprintinstance` - Blueprint Instance * `authentik_core.group` - Group * `authentik_core.user` - User * `authentik_core.application` - Application * `authentik_core.token` - Token * `authentik_enterprise.license` - License * `authentik_providers_rac.racprovider` - RAC Provider * `authentik_providers_rac.endpoint` - RAC Endpoint * `authentik_providers_rac.racpropertymapping` - RAC Property Mapping | [enum: authentik_blueprints.blueprintinstance, authentik_brands.brand, authentik_core.application, authentik_core.group, authentik_core.token, authentik_core.user, authentik_crypto.certificatekeypair, authentik_enterprise.license, authentik_events.event, authentik_events.notification, authentik_events.notificationrule, authentik_events.notificationtransport, authentik_events.notificationwebhookmapping, authentik_flows.flow, authentik_flows.flowstagebinding, authentik_outposts.dockerserviceconnection, authentik_outposts.kubernetesserviceconnection, authentik_outposts.outpost, authentik_policies.policybinding, authentik_policies_dummy.dummypolicy, authentik_policies_event_matcher.eventmatcherpolicy, authentik_policies_expiry.passwordexpirypolicy, authentik_policies_expression.expressionpolicy, authentik_policies_password.passwordpolicy, authentik_policies_reputation.reputation, authentik_policies_reputation.reputationpolicy, authentik_providers_ldap.ldapprovider, authentik_providers_oauth2.accesstoken, authentik_providers_oauth2.authorizationcode, authentik_providers_oauth2.oauth2provider, authentik_providers_oauth2.refreshtoken, authentik_providers_oauth2.scopemapping, authentik_providers_proxy.proxyprovider, authentik_providers_rac.endpoint, authentik_providers_rac.racpropertymapping, authentik_providers_rac.racprovider, authentik_providers_radius.radiusprovider, authentik_providers_saml.samlpropertymapping, authentik_providers_saml.samlprovider, authentik_providers_scim.scimmapping, authentik_providers_scim.scimprovider, authentik_rbac.role, authentik_sources_ldap.ldappropertymapping, authentik_sources_ldap.ldapsource, authentik_sources_oauth.oauthsource, authentik_sources_oauth.useroauthsourceconnection, authentik_sources_plex.plexsource, authentik_sources_plex.plexsourceconnection, authentik_sources_saml.samlsource, authentik_sources_saml.usersamlsourceconnection, authentik_stages_authenticator_duo.authenticatorduostage, authentik_stages_authenticator_duo.duodevice, authentik_stages_authenticator_sms.authenticatorsmsstage, authentik_stages_authenticator_sms.smsdevice, authentik_stages_authenticator_static.authenticatorstaticstage, authentik_stages_authenticator_static.staticdevice, authentik_stages_authenticator_totp.authenticatortotpstage, authentik_stages_authenticator_totp.totpdevice, authentik_stages_authenticator_validate.authenticatorvalidatestage, authentik_stages_authenticator_webauthn.authenticatewebauthnstage, authentik_stages_authenticator_webauthn.webauthndevice, authentik_stages_captcha.captchastage, authentik_stages_consent.consentstage, authentik_stages_consent.userconsent, authentik_stages_deny.denystage, authentik_stages_dummy.dummystage, authentik_stages_email.emailstage, authentik_stages_identification.identificationstage, authentik_stages_invitation.invitation, authentik_stages_invitation.invitationstage, authentik_stages_password.passwordstage, authentik_stages_prompt.prompt, authentik_stages_prompt.promptstage, authentik_stages_user_delete.userdeletestage, authentik_stages_user_login.userloginstage, authentik_stages_user_logout.userlogoutstage, authentik_stages_user_write.userwritestage, authentik_tenants.domain] + **model** | **kotlin.String**| * `authentik_tenants.domain` - Domain * `authentik_crypto.certificatekeypair` - Certificate-Key Pair * `authentik_events.event` - Event * `authentik_events.notificationtransport` - Notification Transport * `authentik_events.notification` - Notification * `authentik_events.notificationrule` - Notification Rule * `authentik_events.notificationwebhookmapping` - Webhook Mapping * `authentik_flows.flow` - Flow * `authentik_flows.flowstagebinding` - Flow Stage Binding * `authentik_outposts.dockerserviceconnection` - Docker Service-Connection * `authentik_outposts.kubernetesserviceconnection` - Kubernetes Service-Connection * `authentik_outposts.outpost` - Outpost * `authentik_policies_dummy.dummypolicy` - Dummy Policy * `authentik_policies_event_matcher.eventmatcherpolicy` - Event Matcher Policy * `authentik_policies_expiry.passwordexpirypolicy` - Password Expiry Policy * `authentik_policies_expression.expressionpolicy` - Expression Policy * `authentik_policies_password.passwordpolicy` - Password Policy * `authentik_policies_reputation.reputationpolicy` - Reputation Policy * `authentik_policies.policybinding` - Policy Binding * `authentik_providers_ldap.ldapprovider` - LDAP Provider * `authentik_providers_oauth2.scopemapping` - Scope Mapping * `authentik_providers_oauth2.oauth2provider` - OAuth2/OpenID Provider * `authentik_providers_proxy.proxyprovider` - Proxy Provider * `authentik_providers_radius.radiusprovider` - Radius Provider * `authentik_providers_saml.samlprovider` - SAML Provider * `authentik_providers_saml.samlpropertymapping` - SAML Property Mapping * `authentik_providers_scim.scimprovider` - SCIM Provider * `authentik_providers_scim.scimmapping` - SCIM Mapping * `authentik_rbac.role` - Role * `authentik_sources_ldap.ldapsource` - LDAP Source * `authentik_sources_ldap.ldappropertymapping` - LDAP Property Mapping * `authentik_sources_oauth.oauthsource` - OAuth Source * `authentik_sources_oauth.useroauthsourceconnection` - User OAuth Source Connection * `authentik_sources_plex.plexsource` - Plex Source * `authentik_sources_plex.plexsourceconnection` - User Plex Source Connection * `authentik_sources_saml.samlsource` - SAML Source * `authentik_sources_saml.usersamlsourceconnection` - User SAML Source Connection * `authentik_stages_authenticator_duo.authenticatorduostage` - Duo Authenticator Setup Stage * `authentik_stages_authenticator_duo.duodevice` - Duo Device * `authentik_stages_authenticator_mobile.authenticatormobilestage` - Mobile Authenticator Setup Stage * `authentik_stages_authenticator_mobile.mobiledevice` - Mobile Device * `authentik_stages_authenticator_sms.authenticatorsmsstage` - SMS Authenticator Setup Stage * `authentik_stages_authenticator_sms.smsdevice` - SMS Device * `authentik_stages_authenticator_static.authenticatorstaticstage` - Static Authenticator Setup Stage * `authentik_stages_authenticator_static.staticdevice` - Static Device * `authentik_stages_authenticator_totp.authenticatortotpstage` - TOTP Authenticator Setup Stage * `authentik_stages_authenticator_totp.totpdevice` - TOTP Device * `authentik_stages_authenticator_validate.authenticatorvalidatestage` - Authenticator Validation Stage * `authentik_stages_authenticator_webauthn.authenticatewebauthnstage` - WebAuthn Authenticator Setup Stage * `authentik_stages_authenticator_webauthn.webauthndevice` - WebAuthn Device * `authentik_stages_captcha.captchastage` - Captcha Stage * `authentik_stages_consent.consentstage` - Consent Stage * `authentik_stages_consent.userconsent` - User Consent * `authentik_stages_deny.denystage` - Deny Stage * `authentik_stages_dummy.dummystage` - Dummy Stage * `authentik_stages_email.emailstage` - Email Stage * `authentik_stages_identification.identificationstage` - Identification Stage * `authentik_stages_invitation.invitationstage` - Invitation Stage * `authentik_stages_invitation.invitation` - Invitation * `authentik_stages_password.passwordstage` - Password Stage * `authentik_stages_prompt.prompt` - Prompt * `authentik_stages_prompt.promptstage` - Prompt Stage * `authentik_stages_user_delete.userdeletestage` - User Delete Stage * `authentik_stages_user_login.userloginstage` - User Login Stage * `authentik_stages_user_logout.userlogoutstage` - User Logout Stage * `authentik_stages_user_write.userwritestage` - User Write Stage * `authentik_brands.brand` - Brand * `authentik_blueprints.blueprintinstance` - Blueprint Instance * `authentik_core.group` - Group * `authentik_core.user` - User * `authentik_core.application` - Application * `authentik_core.token` - Token * `authentik_enterprise.license` - License * `authentik_providers_rac.racprovider` - RAC Provider * `authentik_providers_rac.endpoint` - RAC Endpoint * `authentik_providers_rac.racpropertymapping` - RAC Property Mapping | [enum: authentik_blueprints.blueprintinstance, authentik_brands.brand, authentik_core.application, authentik_core.group, authentik_core.token, authentik_core.user, authentik_crypto.certificatekeypair, authentik_enterprise.license, authentik_events.event, authentik_events.notification, authentik_events.notificationrule, authentik_events.notificationtransport, authentik_events.notificationwebhookmapping, authentik_flows.flow, authentik_flows.flowstagebinding, authentik_outposts.dockerserviceconnection, authentik_outposts.kubernetesserviceconnection, authentik_outposts.outpost, authentik_policies.policybinding, authentik_policies_dummy.dummypolicy, authentik_policies_event_matcher.eventmatcherpolicy, authentik_policies_expiry.passwordexpirypolicy, authentik_policies_expression.expressionpolicy, authentik_policies_password.passwordpolicy, authentik_policies_reputation.reputationpolicy, authentik_providers_ldap.ldapprovider, authentik_providers_oauth2.oauth2provider, authentik_providers_oauth2.scopemapping, authentik_providers_proxy.proxyprovider, authentik_providers_rac.endpoint, authentik_providers_rac.racpropertymapping, authentik_providers_rac.racprovider, authentik_providers_radius.radiusprovider, authentik_providers_saml.samlpropertymapping, authentik_providers_saml.samlprovider, authentik_providers_scim.scimmapping, authentik_providers_scim.scimprovider, authentik_rbac.role, authentik_sources_ldap.ldappropertymapping, authentik_sources_ldap.ldapsource, authentik_sources_oauth.oauthsource, authentik_sources_oauth.useroauthsourceconnection, authentik_sources_plex.plexsource, authentik_sources_plex.plexsourceconnection, authentik_sources_saml.samlsource, authentik_sources_saml.usersamlsourceconnection, authentik_stages_authenticator_duo.authenticatorduostage, authentik_stages_authenticator_duo.duodevice, authentik_stages_authenticator_mobile.authenticatormobilestage, authentik_stages_authenticator_mobile.mobiledevice, authentik_stages_authenticator_sms.authenticatorsmsstage, authentik_stages_authenticator_sms.smsdevice, authentik_stages_authenticator_static.authenticatorstaticstage, authentik_stages_authenticator_static.staticdevice, authentik_stages_authenticator_totp.authenticatortotpstage, authentik_stages_authenticator_totp.totpdevice, authentik_stages_authenticator_validate.authenticatorvalidatestage, authentik_stages_authenticator_webauthn.authenticatewebauthnstage, authentik_stages_authenticator_webauthn.webauthndevice, authentik_stages_captcha.captchastage, authentik_stages_consent.consentstage, authentik_stages_consent.userconsent, authentik_stages_deny.denystage, authentik_stages_dummy.dummystage, authentik_stages_email.emailstage, authentik_stages_identification.identificationstage, authentik_stages_invitation.invitation, authentik_stages_invitation.invitationstage, authentik_stages_password.passwordstage, authentik_stages_prompt.prompt, authentik_stages_prompt.promptstage, authentik_stages_user_delete.userdeletestage, authentik_stages_user_login.userloginstage, authentik_stages_user_logout.userlogoutstage, authentik_stages_user_write.userwritestage, authentik_tenants.domain] **objectPk** | **kotlin.String**| | [optional] **ordering** | **kotlin.String**| Which field to use when ordering the results. | [optional] **page** | **kotlin.Int**| A page number within the paginated result set. | [optional] diff --git a/docs/SCIMSyncStatus.md b/docs/SCIMSyncStatus.md index 4db96f5..d0c7252 100644 --- a/docs/SCIMSyncStatus.md +++ b/docs/SCIMSyncStatus.md @@ -5,7 +5,7 @@ Name | Type | Description | Notes ------------ | ------------- | ------------- | ------------- **isRunning** | **kotlin.Boolean** | | [readonly] -**tasks** | [**kotlin.collections.List<Task>**](Task.md) | | [readonly] +**tasks** | [**kotlin.collections.List<SystemTask>**](SystemTask.md) | | [readonly] diff --git a/docs/SMSDevice.md b/docs/SMSDevice.md index 9c78f75..343d5c3 100644 --- a/docs/SMSDevice.md +++ b/docs/SMSDevice.md @@ -4,9 +4,13 @@ ## Properties Name | Type | Description | Notes ------------ | ------------- | ------------- | ------------- -**name** | **kotlin.String** | The human-readable name of this device. | -**pk** | **kotlin.Int** | | [readonly] -**phoneNumber** | **kotlin.String** | | [readonly] +**verboseName** | **kotlin.String** | Return object's verbose_name | [readonly] +**verboseNamePlural** | **kotlin.String** | Return object's plural verbose_name | [readonly] +**metaModelName** | **kotlin.String** | Return internal model name | [readonly] +**pk** | **kotlin.String** | | +**name** | **kotlin.String** | | +**type** | **kotlin.String** | Get type of device | [readonly] +**confirmed** | **kotlin.Boolean** | | [readonly] diff --git a/docs/SMSDeviceRequest.md b/docs/SMSDeviceRequest.md index 7b9078c..614ec2b 100644 --- a/docs/SMSDeviceRequest.md +++ b/docs/SMSDeviceRequest.md @@ -4,7 +4,8 @@ ## Properties Name | Type | Description | Notes ------------ | ------------- | ------------- | ------------- -**name** | **kotlin.String** | The human-readable name of this device. | +**pk** | **kotlin.String** | | +**name** | **kotlin.String** | | diff --git a/docs/StagesApi.md b/docs/StagesApi.md index e7ff1fa..22247de 100644 --- a/docs/StagesApi.md +++ b/docs/StagesApi.md @@ -20,6 +20,13 @@ Method | HTTP request | Description [**stagesAuthenticatorDuoRetrieve**](StagesApi.md#stagesAuthenticatorDuoRetrieve) | **GET** /stages/authenticator/duo/{stage_uuid}/ | [**stagesAuthenticatorDuoUpdate**](StagesApi.md#stagesAuthenticatorDuoUpdate) | **PUT** /stages/authenticator/duo/{stage_uuid}/ | [**stagesAuthenticatorDuoUsedByList**](StagesApi.md#stagesAuthenticatorDuoUsedByList) | **GET** /stages/authenticator/duo/{stage_uuid}/used_by/ | +[**stagesAuthenticatorMobileCreate**](StagesApi.md#stagesAuthenticatorMobileCreate) | **POST** /stages/authenticator/mobile/ | +[**stagesAuthenticatorMobileDestroy**](StagesApi.md#stagesAuthenticatorMobileDestroy) | **DELETE** /stages/authenticator/mobile/{stage_uuid}/ | +[**stagesAuthenticatorMobileList**](StagesApi.md#stagesAuthenticatorMobileList) | **GET** /stages/authenticator/mobile/ | +[**stagesAuthenticatorMobilePartialUpdate**](StagesApi.md#stagesAuthenticatorMobilePartialUpdate) | **PATCH** /stages/authenticator/mobile/{stage_uuid}/ | +[**stagesAuthenticatorMobileRetrieve**](StagesApi.md#stagesAuthenticatorMobileRetrieve) | **GET** /stages/authenticator/mobile/{stage_uuid}/ | +[**stagesAuthenticatorMobileUpdate**](StagesApi.md#stagesAuthenticatorMobileUpdate) | **PUT** /stages/authenticator/mobile/{stage_uuid}/ | +[**stagesAuthenticatorMobileUsedByList**](StagesApi.md#stagesAuthenticatorMobileUsedByList) | **GET** /stages/authenticator/mobile/{stage_uuid}/used_by/ | [**stagesAuthenticatorSmsCreate**](StagesApi.md#stagesAuthenticatorSmsCreate) | **POST** /stages/authenticator/sms/ | [**stagesAuthenticatorSmsDestroy**](StagesApi.md#stagesAuthenticatorSmsDestroy) | **DELETE** /stages/authenticator/sms/{stage_uuid}/ | [**stagesAuthenticatorSmsList**](StagesApi.md#stagesAuthenticatorSmsList) | **GET** /stages/authenticator/sms/ | @@ -972,6 +979,369 @@ Name | Type | Description | Notes ### Authorization +Configure authentik: + ApiClient.apiKey["Authorization"] = "" + ApiClient.apiKeyPrefix["Authorization"] = "" + +### HTTP request headers + + - **Content-Type**: Not defined + - **Accept**: application/json + + +# **stagesAuthenticatorMobileCreate** +> AuthenticatorMobileStage stagesAuthenticatorMobileCreate(authenticatorMobileStageRequest) + + + +AuthenticatorMobileStage Viewset + +### Example +```kotlin +// Import classes: +//import io.goauthentik.api.infrastructure.* +//import io.goauthentik.api.models.* + +val apiInstance = StagesApi() +val authenticatorMobileStageRequest : AuthenticatorMobileStageRequest = // AuthenticatorMobileStageRequest | +try { + val result : AuthenticatorMobileStage = apiInstance.stagesAuthenticatorMobileCreate(authenticatorMobileStageRequest) + println(result) +} catch (e: ClientException) { + println("4xx response calling StagesApi#stagesAuthenticatorMobileCreate") + e.printStackTrace() +} catch (e: ServerException) { + println("5xx response calling StagesApi#stagesAuthenticatorMobileCreate") + e.printStackTrace() +} +``` + +### Parameters + +Name | Type | Description | Notes +------------- | ------------- | ------------- | ------------- + **authenticatorMobileStageRequest** | [**AuthenticatorMobileStageRequest**](AuthenticatorMobileStageRequest.md)| | + +### Return type + +[**AuthenticatorMobileStage**](AuthenticatorMobileStage.md) + +### Authorization + + +Configure authentik: + ApiClient.apiKey["Authorization"] = "" + ApiClient.apiKeyPrefix["Authorization"] = "" + +### HTTP request headers + + - **Content-Type**: application/json + - **Accept**: application/json + + +# **stagesAuthenticatorMobileDestroy** +> stagesAuthenticatorMobileDestroy(stageUuid) + + + +AuthenticatorMobileStage Viewset + +### Example +```kotlin +// Import classes: +//import io.goauthentik.api.infrastructure.* +//import io.goauthentik.api.models.* + +val apiInstance = StagesApi() +val stageUuid : java.util.UUID = 38400000-8cf0-11bd-b23e-10b96e4ef00d // java.util.UUID | A UUID string identifying this Mobile Authenticator Setup Stage. +try { + apiInstance.stagesAuthenticatorMobileDestroy(stageUuid) +} catch (e: ClientException) { + println("4xx response calling StagesApi#stagesAuthenticatorMobileDestroy") + e.printStackTrace() +} catch (e: ServerException) { + println("5xx response calling StagesApi#stagesAuthenticatorMobileDestroy") + e.printStackTrace() +} +``` + +### Parameters + +Name | Type | Description | Notes +------------- | ------------- | ------------- | ------------- + **stageUuid** | **java.util.UUID**| A UUID string identifying this Mobile Authenticator Setup Stage. | + +### Return type + +null (empty response body) + +### Authorization + + +Configure authentik: + ApiClient.apiKey["Authorization"] = "" + ApiClient.apiKeyPrefix["Authorization"] = "" + +### HTTP request headers + + - **Content-Type**: Not defined + - **Accept**: application/json + + +# **stagesAuthenticatorMobileList** +> PaginatedAuthenticatorMobileStageList stagesAuthenticatorMobileList(configureFlow, name, ordering, page, pageSize, search) + + + +AuthenticatorMobileStage Viewset + +### Example +```kotlin +// Import classes: +//import io.goauthentik.api.infrastructure.* +//import io.goauthentik.api.models.* + +val apiInstance = StagesApi() +val configureFlow : java.util.UUID = 38400000-8cf0-11bd-b23e-10b96e4ef00d // java.util.UUID | +val name : kotlin.String = name_example // kotlin.String | +val ordering : kotlin.String = ordering_example // kotlin.String | Which field to use when ordering the results. +val page : kotlin.Int = 56 // kotlin.Int | A page number within the paginated result set. +val pageSize : kotlin.Int = 56 // kotlin.Int | Number of results to return per page. +val search : kotlin.String = search_example // kotlin.String | A search term. +try { + val result : PaginatedAuthenticatorMobileStageList = apiInstance.stagesAuthenticatorMobileList(configureFlow, name, ordering, page, pageSize, search) + println(result) +} catch (e: ClientException) { + println("4xx response calling StagesApi#stagesAuthenticatorMobileList") + e.printStackTrace() +} catch (e: ServerException) { + println("5xx response calling StagesApi#stagesAuthenticatorMobileList") + e.printStackTrace() +} +``` + +### Parameters + +Name | Type | Description | Notes +------------- | ------------- | ------------- | ------------- + **configureFlow** | **java.util.UUID**| | [optional] + **name** | **kotlin.String**| | [optional] + **ordering** | **kotlin.String**| Which field to use when ordering the results. | [optional] + **page** | **kotlin.Int**| A page number within the paginated result set. | [optional] + **pageSize** | **kotlin.Int**| Number of results to return per page. | [optional] + **search** | **kotlin.String**| A search term. | [optional] + +### Return type + +[**PaginatedAuthenticatorMobileStageList**](PaginatedAuthenticatorMobileStageList.md) + +### Authorization + + +Configure authentik: + ApiClient.apiKey["Authorization"] = "" + ApiClient.apiKeyPrefix["Authorization"] = "" + +### HTTP request headers + + - **Content-Type**: Not defined + - **Accept**: application/json + + +# **stagesAuthenticatorMobilePartialUpdate** +> AuthenticatorMobileStage stagesAuthenticatorMobilePartialUpdate(stageUuid, patchedAuthenticatorMobileStageRequest) + + + +AuthenticatorMobileStage Viewset + +### Example +```kotlin +// Import classes: +//import io.goauthentik.api.infrastructure.* +//import io.goauthentik.api.models.* + +val apiInstance = StagesApi() +val stageUuid : java.util.UUID = 38400000-8cf0-11bd-b23e-10b96e4ef00d // java.util.UUID | A UUID string identifying this Mobile Authenticator Setup Stage. +val patchedAuthenticatorMobileStageRequest : PatchedAuthenticatorMobileStageRequest = // PatchedAuthenticatorMobileStageRequest | +try { + val result : AuthenticatorMobileStage = apiInstance.stagesAuthenticatorMobilePartialUpdate(stageUuid, patchedAuthenticatorMobileStageRequest) + println(result) +} catch (e: ClientException) { + println("4xx response calling StagesApi#stagesAuthenticatorMobilePartialUpdate") + e.printStackTrace() +} catch (e: ServerException) { + println("5xx response calling StagesApi#stagesAuthenticatorMobilePartialUpdate") + e.printStackTrace() +} +``` + +### Parameters + +Name | Type | Description | Notes +------------- | ------------- | ------------- | ------------- + **stageUuid** | **java.util.UUID**| A UUID string identifying this Mobile Authenticator Setup Stage. | + **patchedAuthenticatorMobileStageRequest** | [**PatchedAuthenticatorMobileStageRequest**](PatchedAuthenticatorMobileStageRequest.md)| | [optional] + +### Return type + +[**AuthenticatorMobileStage**](AuthenticatorMobileStage.md) + +### Authorization + + +Configure authentik: + ApiClient.apiKey["Authorization"] = "" + ApiClient.apiKeyPrefix["Authorization"] = "" + +### HTTP request headers + + - **Content-Type**: application/json + - **Accept**: application/json + + +# **stagesAuthenticatorMobileRetrieve** +> AuthenticatorMobileStage stagesAuthenticatorMobileRetrieve(stageUuid) + + + +AuthenticatorMobileStage Viewset + +### Example +```kotlin +// Import classes: +//import io.goauthentik.api.infrastructure.* +//import io.goauthentik.api.models.* + +val apiInstance = StagesApi() +val stageUuid : java.util.UUID = 38400000-8cf0-11bd-b23e-10b96e4ef00d // java.util.UUID | A UUID string identifying this Mobile Authenticator Setup Stage. +try { + val result : AuthenticatorMobileStage = apiInstance.stagesAuthenticatorMobileRetrieve(stageUuid) + println(result) +} catch (e: ClientException) { + println("4xx response calling StagesApi#stagesAuthenticatorMobileRetrieve") + e.printStackTrace() +} catch (e: ServerException) { + println("5xx response calling StagesApi#stagesAuthenticatorMobileRetrieve") + e.printStackTrace() +} +``` + +### Parameters + +Name | Type | Description | Notes +------------- | ------------- | ------------- | ------------- + **stageUuid** | **java.util.UUID**| A UUID string identifying this Mobile Authenticator Setup Stage. | + +### Return type + +[**AuthenticatorMobileStage**](AuthenticatorMobileStage.md) + +### Authorization + + +Configure authentik: + ApiClient.apiKey["Authorization"] = "" + ApiClient.apiKeyPrefix["Authorization"] = "" + +### HTTP request headers + + - **Content-Type**: Not defined + - **Accept**: application/json + + +# **stagesAuthenticatorMobileUpdate** +> AuthenticatorMobileStage stagesAuthenticatorMobileUpdate(stageUuid, authenticatorMobileStageRequest) + + + +AuthenticatorMobileStage Viewset + +### Example +```kotlin +// Import classes: +//import io.goauthentik.api.infrastructure.* +//import io.goauthentik.api.models.* + +val apiInstance = StagesApi() +val stageUuid : java.util.UUID = 38400000-8cf0-11bd-b23e-10b96e4ef00d // java.util.UUID | A UUID string identifying this Mobile Authenticator Setup Stage. +val authenticatorMobileStageRequest : AuthenticatorMobileStageRequest = // AuthenticatorMobileStageRequest | +try { + val result : AuthenticatorMobileStage = apiInstance.stagesAuthenticatorMobileUpdate(stageUuid, authenticatorMobileStageRequest) + println(result) +} catch (e: ClientException) { + println("4xx response calling StagesApi#stagesAuthenticatorMobileUpdate") + e.printStackTrace() +} catch (e: ServerException) { + println("5xx response calling StagesApi#stagesAuthenticatorMobileUpdate") + e.printStackTrace() +} +``` + +### Parameters + +Name | Type | Description | Notes +------------- | ------------- | ------------- | ------------- + **stageUuid** | **java.util.UUID**| A UUID string identifying this Mobile Authenticator Setup Stage. | + **authenticatorMobileStageRequest** | [**AuthenticatorMobileStageRequest**](AuthenticatorMobileStageRequest.md)| | + +### Return type + +[**AuthenticatorMobileStage**](AuthenticatorMobileStage.md) + +### Authorization + + +Configure authentik: + ApiClient.apiKey["Authorization"] = "" + ApiClient.apiKeyPrefix["Authorization"] = "" + +### HTTP request headers + + - **Content-Type**: application/json + - **Accept**: application/json + + +# **stagesAuthenticatorMobileUsedByList** +> kotlin.collections.List<UsedBy> stagesAuthenticatorMobileUsedByList(stageUuid) + + + +Get a list of all objects that use this object + +### Example +```kotlin +// Import classes: +//import io.goauthentik.api.infrastructure.* +//import io.goauthentik.api.models.* + +val apiInstance = StagesApi() +val stageUuid : java.util.UUID = 38400000-8cf0-11bd-b23e-10b96e4ef00d // java.util.UUID | A UUID string identifying this Mobile Authenticator Setup Stage. +try { + val result : kotlin.collections.List = apiInstance.stagesAuthenticatorMobileUsedByList(stageUuid) + println(result) +} catch (e: ClientException) { + println("4xx response calling StagesApi#stagesAuthenticatorMobileUsedByList") + e.printStackTrace() +} catch (e: ServerException) { + println("5xx response calling StagesApi#stagesAuthenticatorMobileUsedByList") + e.printStackTrace() +} +``` + +### Parameters + +Name | Type | Description | Notes +------------- | ------------- | ------------- | ------------- + **stageUuid** | **java.util.UUID**| A UUID string identifying this Mobile Authenticator Setup Stage. | + +### Return type + +[**kotlin.collections.List<UsedBy>**](UsedBy.md) + +### Authorization + + Configure authentik: ApiClient.apiKey["Authorization"] = "" ApiClient.apiKeyPrefix["Authorization"] = "" @@ -1429,7 +1799,7 @@ AuthenticatorStaticStage Viewset //import io.goauthentik.api.models.* val apiInstance = StagesApi() -val stageUuid : java.util.UUID = 38400000-8cf0-11bd-b23e-10b96e4ef00d // java.util.UUID | A UUID string identifying this Static Authenticator Stage. +val stageUuid : java.util.UUID = 38400000-8cf0-11bd-b23e-10b96e4ef00d // java.util.UUID | A UUID string identifying this Static Authenticator Setup Stage. try { apiInstance.stagesAuthenticatorStaticDestroy(stageUuid) } catch (e: ClientException) { @@ -1445,7 +1815,7 @@ try { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - **stageUuid** | **java.util.UUID**| A UUID string identifying this Static Authenticator Stage. | + **stageUuid** | **java.util.UUID**| A UUID string identifying this Static Authenticator Setup Stage. | ### Return type @@ -1546,7 +1916,7 @@ AuthenticatorStaticStage Viewset //import io.goauthentik.api.models.* val apiInstance = StagesApi() -val stageUuid : java.util.UUID = 38400000-8cf0-11bd-b23e-10b96e4ef00d // java.util.UUID | A UUID string identifying this Static Authenticator Stage. +val stageUuid : java.util.UUID = 38400000-8cf0-11bd-b23e-10b96e4ef00d // java.util.UUID | A UUID string identifying this Static Authenticator Setup Stage. val patchedAuthenticatorStaticStageRequest : PatchedAuthenticatorStaticStageRequest = // PatchedAuthenticatorStaticStageRequest | try { val result : AuthenticatorStaticStage = apiInstance.stagesAuthenticatorStaticPartialUpdate(stageUuid, patchedAuthenticatorStaticStageRequest) @@ -1564,7 +1934,7 @@ try { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - **stageUuid** | **java.util.UUID**| A UUID string identifying this Static Authenticator Stage. | + **stageUuid** | **java.util.UUID**| A UUID string identifying this Static Authenticator Setup Stage. | **patchedAuthenticatorStaticStageRequest** | [**PatchedAuthenticatorStaticStageRequest**](PatchedAuthenticatorStaticStageRequest.md)| | [optional] ### Return type @@ -1598,7 +1968,7 @@ AuthenticatorStaticStage Viewset //import io.goauthentik.api.models.* val apiInstance = StagesApi() -val stageUuid : java.util.UUID = 38400000-8cf0-11bd-b23e-10b96e4ef00d // java.util.UUID | A UUID string identifying this Static Authenticator Stage. +val stageUuid : java.util.UUID = 38400000-8cf0-11bd-b23e-10b96e4ef00d // java.util.UUID | A UUID string identifying this Static Authenticator Setup Stage. try { val result : AuthenticatorStaticStage = apiInstance.stagesAuthenticatorStaticRetrieve(stageUuid) println(result) @@ -1615,7 +1985,7 @@ try { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - **stageUuid** | **java.util.UUID**| A UUID string identifying this Static Authenticator Stage. | + **stageUuid** | **java.util.UUID**| A UUID string identifying this Static Authenticator Setup Stage. | ### Return type @@ -1648,7 +2018,7 @@ AuthenticatorStaticStage Viewset //import io.goauthentik.api.models.* val apiInstance = StagesApi() -val stageUuid : java.util.UUID = 38400000-8cf0-11bd-b23e-10b96e4ef00d // java.util.UUID | A UUID string identifying this Static Authenticator Stage. +val stageUuid : java.util.UUID = 38400000-8cf0-11bd-b23e-10b96e4ef00d // java.util.UUID | A UUID string identifying this Static Authenticator Setup Stage. val authenticatorStaticStageRequest : AuthenticatorStaticStageRequest = // AuthenticatorStaticStageRequest | try { val result : AuthenticatorStaticStage = apiInstance.stagesAuthenticatorStaticUpdate(stageUuid, authenticatorStaticStageRequest) @@ -1666,7 +2036,7 @@ try { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - **stageUuid** | **java.util.UUID**| A UUID string identifying this Static Authenticator Stage. | + **stageUuid** | **java.util.UUID**| A UUID string identifying this Static Authenticator Setup Stage. | **authenticatorStaticStageRequest** | [**AuthenticatorStaticStageRequest**](AuthenticatorStaticStageRequest.md)| | ### Return type @@ -1700,7 +2070,7 @@ Get a list of all objects that use this object //import io.goauthentik.api.models.* val apiInstance = StagesApi() -val stageUuid : java.util.UUID = 38400000-8cf0-11bd-b23e-10b96e4ef00d // java.util.UUID | A UUID string identifying this Static Authenticator Stage. +val stageUuid : java.util.UUID = 38400000-8cf0-11bd-b23e-10b96e4ef00d // java.util.UUID | A UUID string identifying this Static Authenticator Setup Stage. try { val result : kotlin.collections.List = apiInstance.stagesAuthenticatorStaticUsedByList(stageUuid) println(result) @@ -1717,7 +2087,7 @@ try { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - **stageUuid** | **java.util.UUID**| A UUID string identifying this Static Authenticator Stage. | + **stageUuid** | **java.util.UUID**| A UUID string identifying this Static Authenticator Setup Stage. | ### Return type diff --git a/docs/StaticDevice.md b/docs/StaticDevice.md index 191c94b..edc21d7 100644 --- a/docs/StaticDevice.md +++ b/docs/StaticDevice.md @@ -4,9 +4,14 @@ ## Properties Name | Type | Description | Notes ------------ | ------------- | ------------- | ------------- -**name** | **kotlin.String** | The human-readable name of this device. | +**verboseName** | **kotlin.String** | Return object's verbose_name | [readonly] +**verboseNamePlural** | **kotlin.String** | Return object's plural verbose_name | [readonly] +**metaModelName** | **kotlin.String** | Return internal model name | [readonly] +**pk** | **kotlin.String** | | +**name** | **kotlin.String** | | +**type** | **kotlin.String** | Get type of device | [readonly] +**confirmed** | **kotlin.Boolean** | | [readonly] **tokenSet** | [**kotlin.collections.List<StaticDeviceToken>**](StaticDeviceToken.md) | | [readonly] -**pk** | **kotlin.Int** | | [readonly] diff --git a/docs/StaticDeviceRequest.md b/docs/StaticDeviceRequest.md index 3e66347..00b07ad 100644 --- a/docs/StaticDeviceRequest.md +++ b/docs/StaticDeviceRequest.md @@ -4,7 +4,8 @@ ## Properties Name | Type | Description | Notes ------------ | ------------- | ------------- | ------------- -**name** | **kotlin.String** | The human-readable name of this device. | +**pk** | **kotlin.String** | | +**name** | **kotlin.String** | | diff --git a/docs/SystemTask.md b/docs/SystemTask.md new file mode 100644 index 0000000..c36a069 --- /dev/null +++ b/docs/SystemTask.md @@ -0,0 +1,19 @@ + +# SystemTask + +## Properties +Name | Type | Description | Notes +------------ | ------------- | ------------- | ------------- +**uuid** | [**java.util.UUID**](java.util.UUID.md) | | [readonly] +**name** | **kotlin.String** | | +**fullName** | **kotlin.String** | Get full name with UID | [readonly] +**description** | **kotlin.String** | | +**startTimestamp** | [**java.time.OffsetDateTime**](java.time.OffsetDateTime.md) | | [readonly] +**finishTimestamp** | [**java.time.OffsetDateTime**](java.time.OffsetDateTime.md) | | [readonly] +**duration** | **kotlin.Double** | | [readonly] +**status** | [**SystemTaskStatusEnum**](SystemTaskStatusEnum.md) | | +**messages** | **kotlin.collections.List<kotlin.String>** | | +**uid** | **kotlin.String** | | [optional] + + + diff --git a/docs/SystemTaskStatusEnum.md b/docs/SystemTaskStatusEnum.md new file mode 100644 index 0000000..77f1408 --- /dev/null +++ b/docs/SystemTaskStatusEnum.md @@ -0,0 +1,18 @@ + +# SystemTaskStatusEnum + +## Enum + + + * `unknown` (value: `"unknown"`) + + * `successful` (value: `"successful"`) + + * `warning` (value: `"warning"`) + + * `error` (value: `"error"`) + + * `unknownDefaultOpenApi` (value: `"unknown_default_open_api"`) + + + diff --git a/docs/TOTPDevice.md b/docs/TOTPDevice.md index d985d5a..c96df52 100644 --- a/docs/TOTPDevice.md +++ b/docs/TOTPDevice.md @@ -4,8 +4,13 @@ ## Properties Name | Type | Description | Notes ------------ | ------------- | ------------- | ------------- -**name** | **kotlin.String** | The human-readable name of this device. | -**pk** | **kotlin.Int** | | [readonly] +**verboseName** | **kotlin.String** | Return object's verbose_name | [readonly] +**verboseNamePlural** | **kotlin.String** | Return object's plural verbose_name | [readonly] +**metaModelName** | **kotlin.String** | Return internal model name | [readonly] +**pk** | **kotlin.String** | | +**name** | **kotlin.String** | | +**type** | **kotlin.String** | Get type of device | [readonly] +**confirmed** | **kotlin.Boolean** | | [readonly] diff --git a/docs/TOTPDeviceRequest.md b/docs/TOTPDeviceRequest.md index 05c9725..b186acb 100644 --- a/docs/TOTPDeviceRequest.md +++ b/docs/TOTPDeviceRequest.md @@ -4,7 +4,8 @@ ## Properties Name | Type | Description | Notes ------------ | ------------- | ------------- | ------------- -**name** | **kotlin.String** | The human-readable name of this device. | +**pk** | **kotlin.String** | | +**name** | **kotlin.String** | | diff --git a/docs/Task.md b/docs/Task.md deleted file mode 100644 index a99d0ad..0000000 --- a/docs/Task.md +++ /dev/null @@ -1,15 +0,0 @@ - -# Task - -## Properties -Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- -**taskName** | **kotlin.String** | | -**taskDescription** | **kotlin.String** | | -**taskFinishTimestamp** | [**java.time.OffsetDateTime**](java.time.OffsetDateTime.md) | | -**taskDuration** | **kotlin.Int** | Get the duration a task took to run | [readonly] -**status** | [**TaskStatusEnum**](TaskStatusEnum.md) | | -**messages** | [**kotlin.collections.List<kotlin.Any>**](kotlin.Any.md) | | - - - diff --git a/docs/TaskStatusEnum.md b/docs/TaskStatusEnum.md deleted file mode 100644 index aa19fa1..0000000 --- a/docs/TaskStatusEnum.md +++ /dev/null @@ -1,18 +0,0 @@ - -# TaskStatusEnum - -## Enum - - - * `sUCCESSFUL` (value: `"SUCCESSFUL"`) - - * `wARNING` (value: `"WARNING"`) - - * `eRROR` (value: `"ERROR"`) - - * `uNKNOWN` (value: `"UNKNOWN"`) - - * `unknownDefaultOpenApi` (value: `"unknown_default_open_api"`) - - - diff --git a/docs/UsedByActionEnum.md b/docs/UsedByActionEnum.md index fbc9cd4..9c29cf0 100644 --- a/docs/UsedByActionEnum.md +++ b/docs/UsedByActionEnum.md @@ -4,13 +4,13 @@ ## Enum - * `cASCADE` (value: `"CASCADE"`) + * `cascade` (value: `"cascade"`) - * `cASCADEMANY` (value: `"CASCADE_MANY"`) + * `cascadeMany` (value: `"cascade_many"`) - * `sETNULL` (value: `"SET_NULL"`) + * `setNull` (value: `"set_null"`) - * `sETDEFAULT` (value: `"SET_DEFAULT"`) + * `setDefault` (value: `"set_default"`) * `unknownDefaultOpenApi` (value: `"unknown_default_open_api"`) diff --git a/docs/User.md b/docs/User.md index 529b76a..792e576 100644 --- a/docs/User.md +++ b/docs/User.md @@ -9,7 +9,7 @@ Name | Type | Description | Notes **name** | **kotlin.String** | User's display name. | **isSuperuser** | **kotlin.Boolean** | | [readonly] **groupsObj** | [**kotlin.collections.List<UserGroup>**](UserGroup.md) | | [readonly] -**avatar** | **kotlin.String** | | [readonly] +**avatar** | **kotlin.String** | User's avatar, either a http/https URL or a data URI | [readonly] **uid** | **kotlin.String** | | [readonly] **uuid** | [**java.util.UUID**](java.util.UUID.md) | | [readonly] **isActive** | **kotlin.Boolean** | Designates whether this user should be treated as active. Unselect this instead of deleting accounts. | [optional] diff --git a/docs/UserSelf.md b/docs/UserSelf.md index 948710d..7e17ca5 100644 --- a/docs/UserSelf.md +++ b/docs/UserSelf.md @@ -10,7 +10,7 @@ Name | Type | Description | Notes **isActive** | **kotlin.Boolean** | Designates whether this user should be treated as active. Unselect this instead of deleting accounts. | [readonly] **isSuperuser** | **kotlin.Boolean** | | [readonly] **groups** | [**kotlin.collections.List<UserSelfGroups>**](UserSelfGroups.md) | | [readonly] -**avatar** | **kotlin.String** | | [readonly] +**avatar** | **kotlin.String** | User's avatar, either a http/https URL or a data URI | [readonly] **uid** | **kotlin.String** | | [readonly] **settings** | [**kotlin.collections.Map<kotlin.String, kotlin.Any>**](kotlin.Any.md) | Get user settings with brand and group settings applied | [readonly] **systemPermissions** | **kotlin.collections.List<kotlin.String>** | Get all system permissions assigned to the user | [readonly] diff --git a/docs/WebAuthnDevice.md b/docs/WebAuthnDevice.md index b452311..158e9a0 100644 --- a/docs/WebAuthnDevice.md +++ b/docs/WebAuthnDevice.md @@ -4,9 +4,13 @@ ## Properties Name | Type | Description | Notes ------------ | ------------- | ------------- | ------------- -**pk** | **kotlin.Int** | | [readonly] +**verboseName** | **kotlin.String** | Return object's verbose_name | [readonly] +**verboseNamePlural** | **kotlin.String** | Return object's plural verbose_name | [readonly] +**metaModelName** | **kotlin.String** | Return internal model name | [readonly] +**pk** | **kotlin.String** | | **name** | **kotlin.String** | | -**createdOn** | [**java.time.OffsetDateTime**](java.time.OffsetDateTime.md) | | [readonly] +**type** | **kotlin.String** | Get type of device | [readonly] +**confirmed** | **kotlin.Boolean** | | [readonly] diff --git a/docs/WebAuthnDeviceRequest.md b/docs/WebAuthnDeviceRequest.md index b06a52f..89b3a2d 100644 --- a/docs/WebAuthnDeviceRequest.md +++ b/docs/WebAuthnDeviceRequest.md @@ -4,6 +4,7 @@ ## Properties Name | Type | Description | Notes ------------ | ------------- | ------------- | ------------- +**pk** | **kotlin.String** | | **name** | **kotlin.String** | | diff --git a/schema.yml b/schema.yml index 0af653c..60f00ff 100644 --- a/schema.yml +++ b/schema.yml @@ -1,7 +1,7 @@ openapi: 3.0.3 info: title: authentik - version: 2023.10.6 + version: 2023.10.7 description: Making authentication simple. contact: email: hello@goauthentik.io @@ -236,14 +236,73 @@ paths: schema: $ref: '#/components/schemas/GenericError' description: '' - /admin/system_tasks/: + /admin/version/: + get: + operationId: admin_version_retrieve + description: Get running and latest version. + tags: + - admin + security: + - authentik: [] + responses: + '200': + content: + application/json: + schema: + $ref: '#/components/schemas/Version' + description: '' + '400': + content: + application/json: + schema: + $ref: '#/components/schemas/ValidationError' + description: '' + '403': + content: + application/json: + schema: + $ref: '#/components/schemas/GenericError' + description: '' + /admin/workers/: get: - operationId: admin_system_tasks_list - description: List system tasks + operationId: admin_workers_retrieve + description: Get currently connected worker count. tags: - admin security: - authentik: [] + responses: + '200': + content: + application/json: + schema: + $ref: '#/components/schemas/Workers' + description: '' + '400': + content: + application/json: + schema: + $ref: '#/components/schemas/ValidationError' + description: '' + '403': + content: + application/json: + schema: + $ref: '#/components/schemas/GenericError' + description: '' + /authenticators/admin/all/: + get: + operationId: authenticators_admin_all_list + description: Get all devices for current user + parameters: + - in: query + name: user + schema: + type: integer + tags: + - authenticators + security: + - authentik: [] responses: '200': content: @@ -251,7 +310,7 @@ paths: schema: type: array items: - $ref: '#/components/schemas/Task' + $ref: '#/components/schemas/Device' description: '' '400': content: @@ -265,18 +324,41 @@ paths: schema: $ref: '#/components/schemas/GenericError' description: '' - /admin/system_tasks/{id}/: + /authenticators/admin/duo/: get: - operationId: admin_system_tasks_retrieve - description: Get a single system task + operationId: authenticators_admin_duo_list + description: Viewset for Duo authenticator devices (for admins) parameters: - - in: path - name: id + - in: query + name: name + schema: + type: string + - name: ordering + required: false + in: query + description: Which field to use when ordering the results. + schema: + type: string + - name: page + required: false + in: query + description: A page number within the paginated result set. + schema: + type: integer + - name: page_size + required: false + in: query + description: Number of results to return per page. + schema: + type: integer + - name: search + required: false + in: query + description: A search term. schema: type: string - required: true tags: - - admin + - authenticators security: - authentik: [] responses: @@ -284,10 +366,8 @@ paths: content: application/json: schema: - $ref: '#/components/schemas/Task' + $ref: '#/components/schemas/PaginatedDuoDeviceList' description: '' - '404': - description: Task not found '400': content: application/json: @@ -300,27 +380,26 @@ paths: schema: $ref: '#/components/schemas/GenericError' description: '' - /admin/system_tasks/{id}/retry/: post: - operationId: admin_system_tasks_retry_create - description: Retry task - parameters: - - in: path - name: id - schema: - type: string - required: true + operationId: authenticators_admin_duo_create + description: Viewset for Duo authenticator devices (for admins) tags: - - admin + - authenticators + requestBody: + content: + application/json: + schema: + $ref: '#/components/schemas/DuoDeviceRequest' + required: true security: - authentik: [] responses: - '204': - description: Task retried successfully - '404': - description: Task not found - '500': - description: Failed to retry task + '201': + content: + application/json: + schema: + $ref: '#/components/schemas/DuoDevice' + description: '' '400': content: application/json: @@ -333,12 +412,19 @@ paths: schema: $ref: '#/components/schemas/GenericError' description: '' - /admin/version/: + /authenticators/admin/duo/{id}/: get: - operationId: admin_version_retrieve - description: Get running and latest version. + operationId: authenticators_admin_duo_retrieve + description: Viewset for Duo authenticator devices (for admins) + parameters: + - in: path + name: id + schema: + type: integer + description: A unique integer value identifying this Duo Device. + required: true tags: - - admin + - authenticators security: - authentik: [] responses: @@ -346,7 +432,7 @@ paths: content: application/json: schema: - $ref: '#/components/schemas/Version' + $ref: '#/components/schemas/DuoDevice' description: '' '400': content: @@ -360,12 +446,24 @@ paths: schema: $ref: '#/components/schemas/GenericError' description: '' - /admin/workers/: - get: - operationId: admin_workers_retrieve - description: Get currently connected worker count. + put: + operationId: authenticators_admin_duo_update + description: Viewset for Duo authenticator devices (for admins) + parameters: + - in: path + name: id + schema: + type: integer + description: A unique integer value identifying this Duo Device. + required: true tags: - - admin + - authenticators + requestBody: + content: + application/json: + schema: + $ref: '#/components/schemas/DuoDeviceRequest' + required: true security: - authentik: [] responses: @@ -373,7 +471,7 @@ paths: content: application/json: schema: - $ref: '#/components/schemas/Workers' + $ref: '#/components/schemas/DuoDevice' description: '' '400': content: @@ -387,17 +485,23 @@ paths: schema: $ref: '#/components/schemas/GenericError' description: '' - /authenticators/admin/all/: - get: - operationId: authenticators_admin_all_list - description: Get all devices for current user + patch: + operationId: authenticators_admin_duo_partial_update + description: Viewset for Duo authenticator devices (for admins) parameters: - - in: query - name: user + - in: path + name: id schema: type: integer + description: A unique integer value identifying this Duo Device. + required: true tags: - authenticators + requestBody: + content: + application/json: + schema: + $ref: '#/components/schemas/PatchedDuoDeviceRequest' security: - authentik: [] responses: @@ -405,9 +509,7 @@ paths: content: application/json: schema: - type: array - items: - $ref: '#/components/schemas/Device' + $ref: '#/components/schemas/DuoDevice' description: '' '400': content: @@ -421,11 +523,40 @@ paths: schema: $ref: '#/components/schemas/GenericError' description: '' - /authenticators/admin/duo/: - get: - operationId: authenticators_admin_duo_list + delete: + operationId: authenticators_admin_duo_destroy description: Viewset for Duo authenticator devices (for admins) parameters: + - in: path + name: id + schema: + type: integer + description: A unique integer value identifying this Duo Device. + required: true + tags: + - authenticators + security: + - authentik: [] + responses: + '204': + description: No response body + '400': + content: + application/json: + schema: + $ref: '#/components/schemas/ValidationError' + description: '' + '403': + content: + application/json: + schema: + $ref: '#/components/schemas/GenericError' + description: '' + /authenticators/admin/mobile/: + get: + operationId: authenticators_admin_mobile_list + description: Viewset for Mobile authenticator devices (for admins) + parameters: - in: query name: name schema: @@ -463,7 +594,7 @@ paths: content: application/json: schema: - $ref: '#/components/schemas/PaginatedDuoDeviceList' + $ref: '#/components/schemas/PaginatedMobileDeviceList' description: '' '400': content: @@ -478,15 +609,15 @@ paths: $ref: '#/components/schemas/GenericError' description: '' post: - operationId: authenticators_admin_duo_create - description: Viewset for Duo authenticator devices (for admins) + operationId: authenticators_admin_mobile_create + description: Viewset for Mobile authenticator devices (for admins) tags: - authenticators requestBody: content: application/json: schema: - $ref: '#/components/schemas/DuoDeviceRequest' + $ref: '#/components/schemas/MobileDeviceRequest' required: true security: - authentik: [] @@ -495,7 +626,7 @@ paths: content: application/json: schema: - $ref: '#/components/schemas/DuoDevice' + $ref: '#/components/schemas/MobileDevice' description: '' '400': content: @@ -509,16 +640,17 @@ paths: schema: $ref: '#/components/schemas/GenericError' description: '' - /authenticators/admin/duo/{id}/: + /authenticators/admin/mobile/{uuid}/: get: - operationId: authenticators_admin_duo_retrieve - description: Viewset for Duo authenticator devices (for admins) + operationId: authenticators_admin_mobile_retrieve + description: Viewset for Mobile authenticator devices (for admins) parameters: - in: path - name: id + name: uuid schema: - type: integer - description: A unique integer value identifying this Duo Device. + type: string + format: uuid + description: A UUID string identifying this Mobile Device. required: true tags: - authenticators @@ -529,7 +661,7 @@ paths: content: application/json: schema: - $ref: '#/components/schemas/DuoDevice' + $ref: '#/components/schemas/MobileDevice' description: '' '400': content: @@ -544,14 +676,15 @@ paths: $ref: '#/components/schemas/GenericError' description: '' put: - operationId: authenticators_admin_duo_update - description: Viewset for Duo authenticator devices (for admins) + operationId: authenticators_admin_mobile_update + description: Viewset for Mobile authenticator devices (for admins) parameters: - in: path - name: id + name: uuid schema: - type: integer - description: A unique integer value identifying this Duo Device. + type: string + format: uuid + description: A UUID string identifying this Mobile Device. required: true tags: - authenticators @@ -559,7 +692,7 @@ paths: content: application/json: schema: - $ref: '#/components/schemas/DuoDeviceRequest' + $ref: '#/components/schemas/MobileDeviceRequest' required: true security: - authentik: [] @@ -568,7 +701,7 @@ paths: content: application/json: schema: - $ref: '#/components/schemas/DuoDevice' + $ref: '#/components/schemas/MobileDevice' description: '' '400': content: @@ -583,14 +716,15 @@ paths: $ref: '#/components/schemas/GenericError' description: '' patch: - operationId: authenticators_admin_duo_partial_update - description: Viewset for Duo authenticator devices (for admins) + operationId: authenticators_admin_mobile_partial_update + description: Viewset for Mobile authenticator devices (for admins) parameters: - in: path - name: id + name: uuid schema: - type: integer - description: A unique integer value identifying this Duo Device. + type: string + format: uuid + description: A UUID string identifying this Mobile Device. required: true tags: - authenticators @@ -598,7 +732,7 @@ paths: content: application/json: schema: - $ref: '#/components/schemas/PatchedDuoDeviceRequest' + $ref: '#/components/schemas/PatchedMobileDeviceRequest' security: - authentik: [] responses: @@ -606,7 +740,7 @@ paths: content: application/json: schema: - $ref: '#/components/schemas/DuoDevice' + $ref: '#/components/schemas/MobileDevice' description: '' '400': content: @@ -621,14 +755,15 @@ paths: $ref: '#/components/schemas/GenericError' description: '' delete: - operationId: authenticators_admin_duo_destroy - description: Viewset for Duo authenticator devices (for admins) + operationId: authenticators_admin_mobile_destroy + description: Viewset for Mobile authenticator devices (for admins) parameters: - in: path - name: id + name: uuid schema: - type: integer - description: A unique integer value identifying this Duo Device. + type: string + format: uuid + description: A UUID string identifying this Mobile Device. required: true tags: - authenticators @@ -1822,10 +1957,10 @@ paths: schema: $ref: '#/components/schemas/GenericError' description: '' - /authenticators/sms/: + /authenticators/mobile/: get: - operationId: authenticators_sms_list - description: Viewset for sms authenticator devices + operationId: authenticators_mobile_list + description: Viewset for Mobile authenticator devices parameters: - in: query name: name @@ -1864,7 +1999,7 @@ paths: content: application/json: schema: - $ref: '#/components/schemas/PaginatedSMSDeviceList' + $ref: '#/components/schemas/PaginatedMobileDeviceList' description: '' '400': content: @@ -1878,16 +2013,17 @@ paths: schema: $ref: '#/components/schemas/GenericError' description: '' - /authenticators/sms/{id}/: + /authenticators/mobile/{uuid}/: get: - operationId: authenticators_sms_retrieve - description: Viewset for sms authenticator devices + operationId: authenticators_mobile_retrieve + description: Viewset for Mobile authenticator devices parameters: - in: path - name: id + name: uuid schema: - type: integer - description: A unique integer value identifying this SMS Device. + type: string + format: uuid + description: A UUID string identifying this Mobile Device. required: true tags: - authenticators @@ -1898,7 +2034,7 @@ paths: content: application/json: schema: - $ref: '#/components/schemas/SMSDevice' + $ref: '#/components/schemas/MobileDevice' description: '' '400': content: @@ -1913,14 +2049,15 @@ paths: $ref: '#/components/schemas/GenericError' description: '' put: - operationId: authenticators_sms_update - description: Viewset for sms authenticator devices + operationId: authenticators_mobile_update + description: Viewset for Mobile authenticator devices parameters: - in: path - name: id + name: uuid schema: - type: integer - description: A unique integer value identifying this SMS Device. + type: string + format: uuid + description: A UUID string identifying this Mobile Device. required: true tags: - authenticators @@ -1928,7 +2065,7 @@ paths: content: application/json: schema: - $ref: '#/components/schemas/SMSDeviceRequest' + $ref: '#/components/schemas/MobileDeviceRequest' required: true security: - authentik: [] @@ -1937,7 +2074,7 @@ paths: content: application/json: schema: - $ref: '#/components/schemas/SMSDevice' + $ref: '#/components/schemas/MobileDevice' description: '' '400': content: @@ -1952,14 +2089,15 @@ paths: $ref: '#/components/schemas/GenericError' description: '' patch: - operationId: authenticators_sms_partial_update - description: Viewset for sms authenticator devices + operationId: authenticators_mobile_partial_update + description: Viewset for Mobile authenticator devices parameters: - in: path - name: id + name: uuid schema: - type: integer - description: A unique integer value identifying this SMS Device. + type: string + format: uuid + description: A UUID string identifying this Mobile Device. required: true tags: - authenticators @@ -1967,7 +2105,7 @@ paths: content: application/json: schema: - $ref: '#/components/schemas/PatchedSMSDeviceRequest' + $ref: '#/components/schemas/PatchedMobileDeviceRequest' security: - authentik: [] responses: @@ -1975,7 +2113,7 @@ paths: content: application/json: schema: - $ref: '#/components/schemas/SMSDevice' + $ref: '#/components/schemas/MobileDevice' description: '' '400': content: @@ -1990,14 +2128,15 @@ paths: $ref: '#/components/schemas/GenericError' description: '' delete: - operationId: authenticators_sms_destroy - description: Viewset for sms authenticator devices + operationId: authenticators_mobile_destroy + description: Viewset for Mobile authenticator devices parameters: - in: path - name: id + name: uuid schema: - type: integer - description: A unique integer value identifying this SMS Device. + type: string + format: uuid + description: A UUID string identifying this Mobile Device. required: true tags: - authenticators @@ -2018,120 +2157,31 @@ paths: schema: $ref: '#/components/schemas/GenericError' description: '' - /authenticators/sms/{id}/used_by/: - get: - operationId: authenticators_sms_used_by_list - description: Get a list of all objects that use this object + /authenticators/mobile/{uuid}/check_in/: + post: + operationId: authenticators_mobile_check_in_create + description: Check in data about a device parameters: - in: path - name: id - schema: - type: integer - description: A unique integer value identifying this SMS Device. - required: true - tags: - - authenticators - security: - - authentik: [] - responses: - '200': - content: - application/json: - schema: - type: array - items: - $ref: '#/components/schemas/UsedBy' - description: '' - '400': - content: - application/json: - schema: - $ref: '#/components/schemas/ValidationError' - description: '' - '403': - content: - application/json: - schema: - $ref: '#/components/schemas/GenericError' - description: '' - /authenticators/static/: - get: - operationId: authenticators_static_list - description: Viewset for static authenticator devices - parameters: - - in: query - name: name - schema: - type: string - - name: ordering - required: false - in: query - description: Which field to use when ordering the results. - schema: - type: string - - name: page - required: false - in: query - description: A page number within the paginated result set. - schema: - type: integer - - name: page_size - required: false - in: query - description: Number of results to return per page. - schema: - type: integer - - name: search - required: false - in: query - description: A search term. + name: uuid schema: type: string - tags: - - authenticators - security: - - authentik: [] - responses: - '200': - content: - application/json: - schema: - $ref: '#/components/schemas/PaginatedStaticDeviceList' - description: '' - '400': - content: - application/json: - schema: - $ref: '#/components/schemas/ValidationError' - description: '' - '403': - content: - application/json: - schema: - $ref: '#/components/schemas/GenericError' - description: '' - /authenticators/static/{id}/: - get: - operationId: authenticators_static_retrieve - description: Viewset for static authenticator devices - parameters: - - in: path - name: id - schema: - type: integer - description: A unique integer value identifying this Static Device. + format: uuid + description: A UUID string identifying this Mobile Device. required: true tags: - authenticators + requestBody: + content: + application/json: + schema: + $ref: '#/components/schemas/MobileDeviceCheckInRequest' + required: true security: - - authentik: [] + - mobile_device_token: [] responses: - '200': - content: - application/json: - schema: - $ref: '#/components/schemas/StaticDevice' - description: '' + '204': + description: Checked in '400': content: application/json: @@ -2144,15 +2194,17 @@ paths: schema: $ref: '#/components/schemas/GenericError' description: '' - put: - operationId: authenticators_static_update - description: Viewset for static authenticator devices + /authenticators/mobile/{uuid}/enrollment_callback/: + post: + operationId: authenticators_mobile_enrollment_callback_create + description: Enrollment callback parameters: - in: path - name: id + name: uuid schema: - type: integer - description: A unique integer value identifying this Static Device. + type: string + format: uuid + description: A UUID string identifying this Mobile Device. required: true tags: - authenticators @@ -2160,16 +2212,16 @@ paths: content: application/json: schema: - $ref: '#/components/schemas/StaticDeviceRequest' + $ref: '#/components/schemas/MobileDeviceEnrollmentRequest' required: true security: - - authentik: [] + - mobile_device_token: [] responses: '200': content: application/json: schema: - $ref: '#/components/schemas/StaticDevice' + $ref: '#/components/schemas/MobileDeviceEnrollmentCallback' description: '' '400': content: @@ -2183,31 +2235,28 @@ paths: schema: $ref: '#/components/schemas/GenericError' description: '' - patch: - operationId: authenticators_static_partial_update - description: Viewset for static authenticator devices + /authenticators/mobile/{uuid}/enrollment_status/: + post: + operationId: authenticators_mobile_enrollment_status_create + description: Check device enrollment status parameters: - in: path - name: id + name: uuid schema: - type: integer - description: A unique integer value identifying this Static Device. + type: string + format: uuid + description: A UUID string identifying this Mobile Device. required: true tags: - authenticators - requestBody: - content: - application/json: - schema: - $ref: '#/components/schemas/PatchedStaticDeviceRequest' security: - - authentik: [] + - mobile_device_token: [] responses: '200': content: application/json: schema: - $ref: '#/components/schemas/StaticDevice' + $ref: '#/components/schemas/MobileDeviceEnrollmentStatus' description: '' '400': content: @@ -2221,23 +2270,33 @@ paths: schema: $ref: '#/components/schemas/GenericError' description: '' - delete: - operationId: authenticators_static_destroy - description: Viewset for static authenticator devices + /authenticators/mobile/{uuid}/receive_response/: + post: + operationId: authenticators_mobile_receive_response_create + description: Get response from notification on phone parameters: - in: path - name: id + name: uuid schema: - type: integer - description: A unique integer value identifying this Static Device. + type: string + format: uuid + description: A UUID string identifying this Mobile Device. required: true tags: - authenticators + requestBody: + content: + application/json: + schema: + $ref: '#/components/schemas/MobileDeviceResponseRequest' + required: true security: - - authentik: [] + - mobile_device_token: [] responses: '204': - description: No response body + description: Key successfully set + '404': + description: Transaction not found '400': content: application/json: @@ -2250,16 +2309,17 @@ paths: schema: $ref: '#/components/schemas/GenericError' description: '' - /authenticators/static/{id}/used_by/: + /authenticators/mobile/{uuid}/used_by/: get: - operationId: authenticators_static_used_by_list + operationId: authenticators_mobile_used_by_list description: Get a list of all objects that use this object parameters: - in: path - name: id + name: uuid schema: - type: integer - description: A unique integer value identifying this Static Device. + type: string + format: uuid + description: A UUID string identifying this Mobile Device. required: true tags: - authenticators @@ -2286,10 +2346,10 @@ paths: schema: $ref: '#/components/schemas/GenericError' description: '' - /authenticators/totp/: + /authenticators/sms/: get: - operationId: authenticators_totp_list - description: Viewset for totp authenticator devices + operationId: authenticators_sms_list + description: Viewset for sms authenticator devices parameters: - in: query name: name @@ -2328,7 +2388,7 @@ paths: content: application/json: schema: - $ref: '#/components/schemas/PaginatedTOTPDeviceList' + $ref: '#/components/schemas/PaginatedSMSDeviceList' description: '' '400': content: @@ -2342,16 +2402,16 @@ paths: schema: $ref: '#/components/schemas/GenericError' description: '' - /authenticators/totp/{id}/: + /authenticators/sms/{id}/: get: - operationId: authenticators_totp_retrieve - description: Viewset for totp authenticator devices + operationId: authenticators_sms_retrieve + description: Viewset for sms authenticator devices parameters: - in: path name: id schema: type: integer - description: A unique integer value identifying this TOTP Device. + description: A unique integer value identifying this SMS Device. required: true tags: - authenticators @@ -2362,7 +2422,7 @@ paths: content: application/json: schema: - $ref: '#/components/schemas/TOTPDevice' + $ref: '#/components/schemas/SMSDevice' description: '' '400': content: @@ -2377,14 +2437,14 @@ paths: $ref: '#/components/schemas/GenericError' description: '' put: - operationId: authenticators_totp_update - description: Viewset for totp authenticator devices + operationId: authenticators_sms_update + description: Viewset for sms authenticator devices parameters: - in: path name: id schema: type: integer - description: A unique integer value identifying this TOTP Device. + description: A unique integer value identifying this SMS Device. required: true tags: - authenticators @@ -2392,7 +2452,7 @@ paths: content: application/json: schema: - $ref: '#/components/schemas/TOTPDeviceRequest' + $ref: '#/components/schemas/SMSDeviceRequest' required: true security: - authentik: [] @@ -2401,7 +2461,7 @@ paths: content: application/json: schema: - $ref: '#/components/schemas/TOTPDevice' + $ref: '#/components/schemas/SMSDevice' description: '' '400': content: @@ -2416,14 +2476,14 @@ paths: $ref: '#/components/schemas/GenericError' description: '' patch: - operationId: authenticators_totp_partial_update - description: Viewset for totp authenticator devices + operationId: authenticators_sms_partial_update + description: Viewset for sms authenticator devices parameters: - in: path name: id schema: type: integer - description: A unique integer value identifying this TOTP Device. + description: A unique integer value identifying this SMS Device. required: true tags: - authenticators @@ -2431,7 +2491,7 @@ paths: content: application/json: schema: - $ref: '#/components/schemas/PatchedTOTPDeviceRequest' + $ref: '#/components/schemas/PatchedSMSDeviceRequest' security: - authentik: [] responses: @@ -2439,7 +2499,7 @@ paths: content: application/json: schema: - $ref: '#/components/schemas/TOTPDevice' + $ref: '#/components/schemas/SMSDevice' description: '' '400': content: @@ -2454,14 +2514,14 @@ paths: $ref: '#/components/schemas/GenericError' description: '' delete: - operationId: authenticators_totp_destroy - description: Viewset for totp authenticator devices + operationId: authenticators_sms_destroy + description: Viewset for sms authenticator devices parameters: - in: path name: id schema: type: integer - description: A unique integer value identifying this TOTP Device. + description: A unique integer value identifying this SMS Device. required: true tags: - authenticators @@ -2482,16 +2542,480 @@ paths: schema: $ref: '#/components/schemas/GenericError' description: '' - /authenticators/totp/{id}/used_by/: + /authenticators/sms/{id}/used_by/: get: - operationId: authenticators_totp_used_by_list + operationId: authenticators_sms_used_by_list description: Get a list of all objects that use this object parameters: - in: path name: id schema: type: integer - description: A unique integer value identifying this TOTP Device. + description: A unique integer value identifying this SMS Device. + required: true + tags: + - authenticators + security: + - authentik: [] + responses: + '200': + content: + application/json: + schema: + type: array + items: + $ref: '#/components/schemas/UsedBy' + description: '' + '400': + content: + application/json: + schema: + $ref: '#/components/schemas/ValidationError' + description: '' + '403': + content: + application/json: + schema: + $ref: '#/components/schemas/GenericError' + description: '' + /authenticators/static/: + get: + operationId: authenticators_static_list + description: Viewset for static authenticator devices + parameters: + - in: query + name: name + schema: + type: string + - name: ordering + required: false + in: query + description: Which field to use when ordering the results. + schema: + type: string + - name: page + required: false + in: query + description: A page number within the paginated result set. + schema: + type: integer + - name: page_size + required: false + in: query + description: Number of results to return per page. + schema: + type: integer + - name: search + required: false + in: query + description: A search term. + schema: + type: string + tags: + - authenticators + security: + - authentik: [] + responses: + '200': + content: + application/json: + schema: + $ref: '#/components/schemas/PaginatedStaticDeviceList' + description: '' + '400': + content: + application/json: + schema: + $ref: '#/components/schemas/ValidationError' + description: '' + '403': + content: + application/json: + schema: + $ref: '#/components/schemas/GenericError' + description: '' + /authenticators/static/{id}/: + get: + operationId: authenticators_static_retrieve + description: Viewset for static authenticator devices + parameters: + - in: path + name: id + schema: + type: integer + description: A unique integer value identifying this Static Device. + required: true + tags: + - authenticators + security: + - authentik: [] + responses: + '200': + content: + application/json: + schema: + $ref: '#/components/schemas/StaticDevice' + description: '' + '400': + content: + application/json: + schema: + $ref: '#/components/schemas/ValidationError' + description: '' + '403': + content: + application/json: + schema: + $ref: '#/components/schemas/GenericError' + description: '' + put: + operationId: authenticators_static_update + description: Viewset for static authenticator devices + parameters: + - in: path + name: id + schema: + type: integer + description: A unique integer value identifying this Static Device. + required: true + tags: + - authenticators + requestBody: + content: + application/json: + schema: + $ref: '#/components/schemas/StaticDeviceRequest' + required: true + security: + - authentik: [] + responses: + '200': + content: + application/json: + schema: + $ref: '#/components/schemas/StaticDevice' + description: '' + '400': + content: + application/json: + schema: + $ref: '#/components/schemas/ValidationError' + description: '' + '403': + content: + application/json: + schema: + $ref: '#/components/schemas/GenericError' + description: '' + patch: + operationId: authenticators_static_partial_update + description: Viewset for static authenticator devices + parameters: + - in: path + name: id + schema: + type: integer + description: A unique integer value identifying this Static Device. + required: true + tags: + - authenticators + requestBody: + content: + application/json: + schema: + $ref: '#/components/schemas/PatchedStaticDeviceRequest' + security: + - authentik: [] + responses: + '200': + content: + application/json: + schema: + $ref: '#/components/schemas/StaticDevice' + description: '' + '400': + content: + application/json: + schema: + $ref: '#/components/schemas/ValidationError' + description: '' + '403': + content: + application/json: + schema: + $ref: '#/components/schemas/GenericError' + description: '' + delete: + operationId: authenticators_static_destroy + description: Viewset for static authenticator devices + parameters: + - in: path + name: id + schema: + type: integer + description: A unique integer value identifying this Static Device. + required: true + tags: + - authenticators + security: + - authentik: [] + responses: + '204': + description: No response body + '400': + content: + application/json: + schema: + $ref: '#/components/schemas/ValidationError' + description: '' + '403': + content: + application/json: + schema: + $ref: '#/components/schemas/GenericError' + description: '' + /authenticators/static/{id}/used_by/: + get: + operationId: authenticators_static_used_by_list + description: Get a list of all objects that use this object + parameters: + - in: path + name: id + schema: + type: integer + description: A unique integer value identifying this Static Device. + required: true + tags: + - authenticators + security: + - authentik: [] + responses: + '200': + content: + application/json: + schema: + type: array + items: + $ref: '#/components/schemas/UsedBy' + description: '' + '400': + content: + application/json: + schema: + $ref: '#/components/schemas/ValidationError' + description: '' + '403': + content: + application/json: + schema: + $ref: '#/components/schemas/GenericError' + description: '' + /authenticators/totp/: + get: + operationId: authenticators_totp_list + description: Viewset for totp authenticator devices + parameters: + - in: query + name: name + schema: + type: string + - name: ordering + required: false + in: query + description: Which field to use when ordering the results. + schema: + type: string + - name: page + required: false + in: query + description: A page number within the paginated result set. + schema: + type: integer + - name: page_size + required: false + in: query + description: Number of results to return per page. + schema: + type: integer + - name: search + required: false + in: query + description: A search term. + schema: + type: string + tags: + - authenticators + security: + - authentik: [] + responses: + '200': + content: + application/json: + schema: + $ref: '#/components/schemas/PaginatedTOTPDeviceList' + description: '' + '400': + content: + application/json: + schema: + $ref: '#/components/schemas/ValidationError' + description: '' + '403': + content: + application/json: + schema: + $ref: '#/components/schemas/GenericError' + description: '' + /authenticators/totp/{id}/: + get: + operationId: authenticators_totp_retrieve + description: Viewset for totp authenticator devices + parameters: + - in: path + name: id + schema: + type: integer + description: A unique integer value identifying this TOTP Device. + required: true + tags: + - authenticators + security: + - authentik: [] + responses: + '200': + content: + application/json: + schema: + $ref: '#/components/schemas/TOTPDevice' + description: '' + '400': + content: + application/json: + schema: + $ref: '#/components/schemas/ValidationError' + description: '' + '403': + content: + application/json: + schema: + $ref: '#/components/schemas/GenericError' + description: '' + put: + operationId: authenticators_totp_update + description: Viewset for totp authenticator devices + parameters: + - in: path + name: id + schema: + type: integer + description: A unique integer value identifying this TOTP Device. + required: true + tags: + - authenticators + requestBody: + content: + application/json: + schema: + $ref: '#/components/schemas/TOTPDeviceRequest' + required: true + security: + - authentik: [] + responses: + '200': + content: + application/json: + schema: + $ref: '#/components/schemas/TOTPDevice' + description: '' + '400': + content: + application/json: + schema: + $ref: '#/components/schemas/ValidationError' + description: '' + '403': + content: + application/json: + schema: + $ref: '#/components/schemas/GenericError' + description: '' + patch: + operationId: authenticators_totp_partial_update + description: Viewset for totp authenticator devices + parameters: + - in: path + name: id + schema: + type: integer + description: A unique integer value identifying this TOTP Device. + required: true + tags: + - authenticators + requestBody: + content: + application/json: + schema: + $ref: '#/components/schemas/PatchedTOTPDeviceRequest' + security: + - authentik: [] + responses: + '200': + content: + application/json: + schema: + $ref: '#/components/schemas/TOTPDevice' + description: '' + '400': + content: + application/json: + schema: + $ref: '#/components/schemas/ValidationError' + description: '' + '403': + content: + application/json: + schema: + $ref: '#/components/schemas/GenericError' + description: '' + delete: + operationId: authenticators_totp_destroy + description: Viewset for totp authenticator devices + parameters: + - in: path + name: id + schema: + type: integer + description: A unique integer value identifying this TOTP Device. + required: true + tags: + - authenticators + security: + - authentik: [] + responses: + '204': + description: No response body + '400': + content: + application/json: + schema: + $ref: '#/components/schemas/ValidationError' + description: '' + '403': + content: + application/json: + schema: + $ref: '#/components/schemas/GenericError' + description: '' + /authenticators/totp/{id}/used_by/: + get: + operationId: authenticators_totp_used_by_list + description: Get a list of all objects that use this object + parameters: + - in: path + name: id + schema: + type: integer + description: A unique integer value identifying this TOTP Device. required: true tags: - authenticators @@ -2755,6 +3279,10 @@ paths: operationId: core_applications_list description: Custom list method that checks Policy based access instead of guardian parameters: + - in: query + name: for_user + schema: + type: integer - in: query name: group schema: @@ -3028,8 +3556,6 @@ paths: schema: $ref: '#/components/schemas/PolicyTestResult' description: '' - '404': - description: for_user user not found '400': content: application/json: @@ -3675,6 +4201,7 @@ paths: tags: - core security: + - mobile_device_token: [] - authentik: [] - {} responses: @@ -5165,6 +5692,7 @@ paths: tags: - core security: + - mobile_device_token: [] - authentik: [] responses: '200': @@ -6768,128 +7296,308 @@ paths: schema: type: string - in: query - name: severity + name: severity + schema: + type: string + enum: + - alert + - notice + - warning + description: |- + Controls which severity level the created notifications will have. + + * `notice` - Notice + * `warning` - Warning + * `alert` - Alert + tags: + - events + security: + - authentik: [] + responses: + '200': + content: + application/json: + schema: + $ref: '#/components/schemas/PaginatedNotificationRuleList' + description: '' + '400': + content: + application/json: + schema: + $ref: '#/components/schemas/ValidationError' + description: '' + '403': + content: + application/json: + schema: + $ref: '#/components/schemas/GenericError' + description: '' + post: + operationId: events_rules_create + description: NotificationRule Viewset + tags: + - events + requestBody: + content: + application/json: + schema: + $ref: '#/components/schemas/NotificationRuleRequest' + required: true + security: + - authentik: [] + responses: + '201': + content: + application/json: + schema: + $ref: '#/components/schemas/NotificationRule' + description: '' + '400': + content: + application/json: + schema: + $ref: '#/components/schemas/ValidationError' + description: '' + '403': + content: + application/json: + schema: + $ref: '#/components/schemas/GenericError' + description: '' + /events/rules/{pbm_uuid}/: + get: + operationId: events_rules_retrieve + description: NotificationRule Viewset + parameters: + - in: path + name: pbm_uuid + schema: + type: string + format: uuid + description: A UUID string identifying this Notification Rule. + required: true + tags: + - events + security: + - authentik: [] + responses: + '200': + content: + application/json: + schema: + $ref: '#/components/schemas/NotificationRule' + description: '' + '400': + content: + application/json: + schema: + $ref: '#/components/schemas/ValidationError' + description: '' + '403': + content: + application/json: + schema: + $ref: '#/components/schemas/GenericError' + description: '' + put: + operationId: events_rules_update + description: NotificationRule Viewset + parameters: + - in: path + name: pbm_uuid + schema: + type: string + format: uuid + description: A UUID string identifying this Notification Rule. + required: true + tags: + - events + requestBody: + content: + application/json: + schema: + $ref: '#/components/schemas/NotificationRuleRequest' + required: true + security: + - authentik: [] + responses: + '200': + content: + application/json: + schema: + $ref: '#/components/schemas/NotificationRule' + description: '' + '400': + content: + application/json: + schema: + $ref: '#/components/schemas/ValidationError' + description: '' + '403': + content: + application/json: + schema: + $ref: '#/components/schemas/GenericError' + description: '' + patch: + operationId: events_rules_partial_update + description: NotificationRule Viewset + parameters: + - in: path + name: pbm_uuid + schema: + type: string + format: uuid + description: A UUID string identifying this Notification Rule. + required: true + tags: + - events + requestBody: + content: + application/json: + schema: + $ref: '#/components/schemas/PatchedNotificationRuleRequest' + security: + - authentik: [] + responses: + '200': + content: + application/json: + schema: + $ref: '#/components/schemas/NotificationRule' + description: '' + '400': + content: + application/json: + schema: + $ref: '#/components/schemas/ValidationError' + description: '' + '403': + content: + application/json: + schema: + $ref: '#/components/schemas/GenericError' + description: '' + delete: + operationId: events_rules_destroy + description: NotificationRule Viewset + parameters: + - in: path + name: pbm_uuid + schema: + type: string + format: uuid + description: A UUID string identifying this Notification Rule. + required: true + tags: + - events + security: + - authentik: [] + responses: + '204': + description: No response body + '400': + content: + application/json: + schema: + $ref: '#/components/schemas/ValidationError' + description: '' + '403': + content: + application/json: + schema: + $ref: '#/components/schemas/GenericError' + description: '' + /events/rules/{pbm_uuid}/used_by/: + get: + operationId: events_rules_used_by_list + description: Get a list of all objects that use this object + parameters: + - in: path + name: pbm_uuid + schema: + type: string + format: uuid + description: A UUID string identifying this Notification Rule. + required: true + tags: + - events + security: + - authentik: [] + responses: + '200': + content: + application/json: + schema: + type: array + items: + $ref: '#/components/schemas/UsedBy' + description: '' + '400': + content: + application/json: + schema: + $ref: '#/components/schemas/ValidationError' + description: '' + '403': + content: + application/json: + schema: + $ref: '#/components/schemas/GenericError' + description: '' + /events/system_tasks/: + get: + operationId: events_system_tasks_list + description: Read-only view set that returns all background tasks + parameters: + - in: query + name: name + schema: + type: string + - name: ordering + required: false + in: query + description: Which field to use when ordering the results. + schema: + type: string + - name: page + required: false + in: query + description: A page number within the paginated result set. + schema: + type: integer + - name: page_size + required: false + in: query + description: Number of results to return per page. + schema: + type: integer + - name: search + required: false + in: query + description: A search term. + schema: + type: string + - in: query + name: status schema: type: string enum: - - alert - - notice + - error + - successful + - unknown - warning description: |- - Controls which severity level the created notifications will have. - - * `notice` - Notice + * `unknown` - Unknown + * `successful` - Successful * `warning` - Warning - * `alert` - Alert - tags: - - events - security: - - authentik: [] - responses: - '200': - content: - application/json: - schema: - $ref: '#/components/schemas/PaginatedNotificationRuleList' - description: '' - '400': - content: - application/json: - schema: - $ref: '#/components/schemas/ValidationError' - description: '' - '403': - content: - application/json: - schema: - $ref: '#/components/schemas/GenericError' - description: '' - post: - operationId: events_rules_create - description: NotificationRule Viewset - tags: - - events - requestBody: - content: - application/json: - schema: - $ref: '#/components/schemas/NotificationRuleRequest' - required: true - security: - - authentik: [] - responses: - '201': - content: - application/json: - schema: - $ref: '#/components/schemas/NotificationRule' - description: '' - '400': - content: - application/json: - schema: - $ref: '#/components/schemas/ValidationError' - description: '' - '403': - content: - application/json: - schema: - $ref: '#/components/schemas/GenericError' - description: '' - /events/rules/{pbm_uuid}/: - get: - operationId: events_rules_retrieve - description: NotificationRule Viewset - parameters: - - in: path - name: pbm_uuid - schema: - type: string - format: uuid - description: A UUID string identifying this Notification Rule. - required: true - tags: - - events - security: - - authentik: [] - responses: - '200': - content: - application/json: - schema: - $ref: '#/components/schemas/NotificationRule' - description: '' - '400': - content: - application/json: - schema: - $ref: '#/components/schemas/ValidationError' - description: '' - '403': - content: - application/json: - schema: - $ref: '#/components/schemas/GenericError' - description: '' - put: - operationId: events_rules_update - description: NotificationRule Viewset - parameters: - - in: path - name: pbm_uuid + * `error` - Error + - in: query + name: uid schema: type: string - format: uuid - description: A UUID string identifying this Notification Rule. - required: true tags: - events - requestBody: - content: - application/json: - schema: - $ref: '#/components/schemas/NotificationRuleRequest' - required: true security: - authentik: [] responses: @@ -6897,7 +7605,7 @@ paths: content: application/json: schema: - $ref: '#/components/schemas/NotificationRule' + $ref: '#/components/schemas/PaginatedSystemTaskList' description: '' '400': content: @@ -6911,24 +7619,20 @@ paths: schema: $ref: '#/components/schemas/GenericError' description: '' - patch: - operationId: events_rules_partial_update - description: NotificationRule Viewset + /events/system_tasks/{uuid}/: + get: + operationId: events_system_tasks_retrieve + description: Read-only view set that returns all background tasks parameters: - in: path - name: pbm_uuid + name: uuid schema: type: string format: uuid - description: A UUID string identifying this Notification Rule. + description: A UUID string identifying this System Task. required: true tags: - events - requestBody: - content: - application/json: - schema: - $ref: '#/components/schemas/PatchedNotificationRuleRequest' security: - authentik: [] responses: @@ -6936,7 +7640,7 @@ paths: content: application/json: schema: - $ref: '#/components/schemas/NotificationRule' + $ref: '#/components/schemas/SystemTask' description: '' '400': content: @@ -6950,16 +7654,17 @@ paths: schema: $ref: '#/components/schemas/GenericError' description: '' - delete: - operationId: events_rules_destroy - description: NotificationRule Viewset + /events/system_tasks/{uuid}/run/: + post: + operationId: events_system_tasks_run_create + description: Run task parameters: - in: path - name: pbm_uuid + name: uuid schema: type: string format: uuid - description: A UUID string identifying this Notification Rule. + description: A UUID string identifying this System Task. required: true tags: - events @@ -6967,44 +7672,11 @@ paths: - authentik: [] responses: '204': - description: No response body - '400': - content: - application/json: - schema: - $ref: '#/components/schemas/ValidationError' - description: '' - '403': - content: - application/json: - schema: - $ref: '#/components/schemas/GenericError' - description: '' - /events/rules/{pbm_uuid}/used_by/: - get: - operationId: events_rules_used_by_list - description: Get a list of all objects that use this object - parameters: - - in: path - name: pbm_uuid - schema: - type: string - format: uuid - description: A UUID string identifying this Notification Rule. - required: true - tags: - - events - security: - - authentik: [] - responses: - '200': - content: - application/json: - schema: - type: array - items: - $ref: '#/components/schemas/UsedBy' - description: '' + description: Task retried successfully + '404': + description: Task not found + '500': + description: Failed to retry task '400': content: application/json: @@ -15995,6 +16667,10 @@ paths: operationId: providers_oauth2_preview_user_retrieve description: Preview user data for provider parameters: + - in: query + name: for_user + schema: + type: integer - in: path name: id schema: @@ -17362,6 +18038,10 @@ paths: operationId: providers_saml_preview_user_retrieve description: Preview user data for provider parameters: + - in: query + name: for_user + schema: + type: integer - in: path name: id schema: @@ -18172,13 +18852,9 @@ paths: - authentik_policies_expiry.passwordexpirypolicy - authentik_policies_expression.expressionpolicy - authentik_policies_password.passwordpolicy - - authentik_policies_reputation.reputation - authentik_policies_reputation.reputationpolicy - authentik_providers_ldap.ldapprovider - - authentik_providers_oauth2.accesstoken - - authentik_providers_oauth2.authorizationcode - authentik_providers_oauth2.oauth2provider - - authentik_providers_oauth2.refreshtoken - authentik_providers_oauth2.scopemapping - authentik_providers_proxy.proxyprovider - authentik_providers_rac.endpoint @@ -18200,6 +18876,8 @@ paths: - authentik_sources_saml.usersamlsourceconnection - authentik_stages_authenticator_duo.authenticatorduostage - authentik_stages_authenticator_duo.duodevice + - authentik_stages_authenticator_mobile.authenticatormobilestage + - authentik_stages_authenticator_mobile.mobiledevice - authentik_stages_authenticator_sms.authenticatorsmsstage - authentik_stages_authenticator_sms.smsdevice - authentik_stages_authenticator_static.authenticatorstaticstage @@ -18245,14 +18923,10 @@ paths: * `authentik_policies_expression.expressionpolicy` - Expression Policy * `authentik_policies_password.passwordpolicy` - Password Policy * `authentik_policies_reputation.reputationpolicy` - Reputation Policy - * `authentik_policies_reputation.reputation` - Reputation Score * `authentik_policies.policybinding` - Policy Binding * `authentik_providers_ldap.ldapprovider` - LDAP Provider * `authentik_providers_oauth2.scopemapping` - Scope Mapping * `authentik_providers_oauth2.oauth2provider` - OAuth2/OpenID Provider - * `authentik_providers_oauth2.authorizationcode` - Authorization Code - * `authentik_providers_oauth2.accesstoken` - OAuth2 Access Token - * `authentik_providers_oauth2.refreshtoken` - OAuth2 Refresh Token * `authentik_providers_proxy.proxyprovider` - Proxy Provider * `authentik_providers_radius.radiusprovider` - Radius Provider * `authentik_providers_saml.samlprovider` - SAML Provider @@ -18270,9 +18944,11 @@ paths: * `authentik_sources_saml.usersamlsourceconnection` - User SAML Source Connection * `authentik_stages_authenticator_duo.authenticatorduostage` - Duo Authenticator Setup Stage * `authentik_stages_authenticator_duo.duodevice` - Duo Device + * `authentik_stages_authenticator_mobile.authenticatormobilestage` - Mobile Authenticator Setup Stage + * `authentik_stages_authenticator_mobile.mobiledevice` - Mobile Device * `authentik_stages_authenticator_sms.authenticatorsmsstage` - SMS Authenticator Setup Stage * `authentik_stages_authenticator_sms.smsdevice` - SMS Device - * `authentik_stages_authenticator_static.authenticatorstaticstage` - Static Authenticator Stage + * `authentik_stages_authenticator_static.authenticatorstaticstage` - Static Authenticator Setup Stage * `authentik_stages_authenticator_static.staticdevice` - Static Device * `authentik_stages_authenticator_totp.authenticatortotpstage` - TOTP Authenticator Setup Stage * `authentik_stages_authenticator_totp.totpdevice` - TOTP Device @@ -18468,13 +19144,9 @@ paths: - authentik_policies_expiry.passwordexpirypolicy - authentik_policies_expression.expressionpolicy - authentik_policies_password.passwordpolicy - - authentik_policies_reputation.reputation - authentik_policies_reputation.reputationpolicy - authentik_providers_ldap.ldapprovider - - authentik_providers_oauth2.accesstoken - - authentik_providers_oauth2.authorizationcode - authentik_providers_oauth2.oauth2provider - - authentik_providers_oauth2.refreshtoken - authentik_providers_oauth2.scopemapping - authentik_providers_proxy.proxyprovider - authentik_providers_rac.endpoint @@ -18496,6 +19168,8 @@ paths: - authentik_sources_saml.usersamlsourceconnection - authentik_stages_authenticator_duo.authenticatorduostage - authentik_stages_authenticator_duo.duodevice + - authentik_stages_authenticator_mobile.authenticatormobilestage + - authentik_stages_authenticator_mobile.mobiledevice - authentik_stages_authenticator_sms.authenticatorsmsstage - authentik_stages_authenticator_sms.smsdevice - authentik_stages_authenticator_static.authenticatorstaticstage @@ -18541,14 +19215,10 @@ paths: * `authentik_policies_expression.expressionpolicy` - Expression Policy * `authentik_policies_password.passwordpolicy` - Password Policy * `authentik_policies_reputation.reputationpolicy` - Reputation Policy - * `authentik_policies_reputation.reputation` - Reputation Score * `authentik_policies.policybinding` - Policy Binding * `authentik_providers_ldap.ldapprovider` - LDAP Provider * `authentik_providers_oauth2.scopemapping` - Scope Mapping * `authentik_providers_oauth2.oauth2provider` - OAuth2/OpenID Provider - * `authentik_providers_oauth2.authorizationcode` - Authorization Code - * `authentik_providers_oauth2.accesstoken` - OAuth2 Access Token - * `authentik_providers_oauth2.refreshtoken` - OAuth2 Refresh Token * `authentik_providers_proxy.proxyprovider` - Proxy Provider * `authentik_providers_radius.radiusprovider` - Radius Provider * `authentik_providers_saml.samlprovider` - SAML Provider @@ -18566,9 +19236,11 @@ paths: * `authentik_sources_saml.usersamlsourceconnection` - User SAML Source Connection * `authentik_stages_authenticator_duo.authenticatorduostage` - Duo Authenticator Setup Stage * `authentik_stages_authenticator_duo.duodevice` - Duo Device + * `authentik_stages_authenticator_mobile.authenticatormobilestage` - Mobile Authenticator Setup Stage + * `authentik_stages_authenticator_mobile.mobiledevice` - Mobile Device * `authentik_stages_authenticator_sms.authenticatorsmsstage` - SMS Authenticator Setup Stage * `authentik_stages_authenticator_sms.smsdevice` - SMS Device - * `authentik_stages_authenticator_static.authenticatorstaticstage` - Static Authenticator Stage + * `authentik_stages_authenticator_static.authenticatorstaticstage` - Static Authenticator Setup Stage * `authentik_stages_authenticator_static.staticdevice` - Static Device * `authentik_stages_authenticator_totp.authenticatortotpstage` - TOTP Authenticator Setup Stage * `authentik_stages_authenticator_totp.totpdevice` - TOTP Device @@ -22572,8 +23244,87 @@ paths: schema: $ref: '#/components/schemas/GenericError' description: '' - put: - operationId: stages_authenticator_duo_update + put: + operationId: stages_authenticator_duo_update + description: AuthenticatorDuoStage Viewset + parameters: + - in: path + name: stage_uuid + schema: + type: string + format: uuid + description: A UUID string identifying this Duo Authenticator Setup Stage. + required: true + tags: + - stages + requestBody: + content: + application/json: + schema: + $ref: '#/components/schemas/AuthenticatorDuoStageRequest' + required: true + security: + - authentik: [] + responses: + '200': + content: + application/json: + schema: + $ref: '#/components/schemas/AuthenticatorDuoStage' + description: '' + '400': + content: + application/json: + schema: + $ref: '#/components/schemas/ValidationError' + description: '' + '403': + content: + application/json: + schema: + $ref: '#/components/schemas/GenericError' + description: '' + patch: + operationId: stages_authenticator_duo_partial_update + description: AuthenticatorDuoStage Viewset + parameters: + - in: path + name: stage_uuid + schema: + type: string + format: uuid + description: A UUID string identifying this Duo Authenticator Setup Stage. + required: true + tags: + - stages + requestBody: + content: + application/json: + schema: + $ref: '#/components/schemas/PatchedAuthenticatorDuoStageRequest' + security: + - authentik: [] + responses: + '200': + content: + application/json: + schema: + $ref: '#/components/schemas/AuthenticatorDuoStage' + description: '' + '400': + content: + application/json: + schema: + $ref: '#/components/schemas/ValidationError' + description: '' + '403': + content: + application/json: + schema: + $ref: '#/components/schemas/GenericError' + description: '' + delete: + operationId: stages_authenticator_duo_destroy description: AuthenticatorDuoStage Viewset parameters: - in: path @@ -22585,12 +23336,37 @@ paths: required: true tags: - stages - requestBody: - content: - application/json: - schema: - $ref: '#/components/schemas/AuthenticatorDuoStageRequest' + security: + - authentik: [] + responses: + '204': + description: No response body + '400': + content: + application/json: + schema: + $ref: '#/components/schemas/ValidationError' + description: '' + '403': + content: + application/json: + schema: + $ref: '#/components/schemas/GenericError' + description: '' + /stages/authenticator/duo/{stage_uuid}/enrollment_status/: + post: + operationId: stages_authenticator_duo_enrollment_status_create + description: Check enrollment status of user details in current session + parameters: + - in: path + name: stage_uuid + schema: + type: string + format: uuid + description: A UUID string identifying this Duo Authenticator Setup Stage. required: true + tags: + - stages security: - authentik: [] responses: @@ -22598,7 +23374,7 @@ paths: content: application/json: schema: - $ref: '#/components/schemas/AuthenticatorDuoStage' + $ref: '#/components/schemas/DuoDeviceEnrollmentStatus' description: '' '400': content: @@ -22612,9 +23388,10 @@ paths: schema: $ref: '#/components/schemas/GenericError' description: '' - patch: - operationId: stages_authenticator_duo_partial_update - description: AuthenticatorDuoStage Viewset + /stages/authenticator/duo/{stage_uuid}/import_device_manual/: + post: + operationId: stages_authenticator_duo_import_device_manual_create + description: Import duo devices into authentik parameters: - in: path name: stage_uuid @@ -22629,31 +23406,56 @@ paths: content: application/json: schema: - $ref: '#/components/schemas/PatchedAuthenticatorDuoStageRequest' + $ref: '#/components/schemas/AuthenticatorDuoStageManualDeviceImportRequest' + required: true security: - authentik: [] responses: - '200': + '204': + description: Enrollment successful + '400': + description: Bad request + '403': content: application/json: schema: - $ref: '#/components/schemas/AuthenticatorDuoStage' + $ref: '#/components/schemas/GenericError' description: '' - '400': + /stages/authenticator/duo/{stage_uuid}/import_devices_automatic/: + post: + operationId: stages_authenticator_duo_import_devices_automatic_create + description: Import duo devices into authentik + parameters: + - in: path + name: stage_uuid + schema: + type: string + format: uuid + description: A UUID string identifying this Duo Authenticator Setup Stage. + required: true + tags: + - stages + security: + - authentik: [] + responses: + '200': content: application/json: schema: - $ref: '#/components/schemas/ValidationError' + $ref: '#/components/schemas/AuthenticatorDuoStageDeviceImportResponse' description: '' + '400': + description: Bad request '403': content: application/json: schema: $ref: '#/components/schemas/GenericError' description: '' - delete: - operationId: stages_authenticator_duo_destroy - description: AuthenticatorDuoStage Viewset + /stages/authenticator/duo/{stage_uuid}/used_by/: + get: + operationId: stages_authenticator_duo_used_by_list + description: Get a list of all objects that use this object parameters: - in: path name: stage_uuid @@ -22667,8 +23469,75 @@ paths: security: - authentik: [] responses: - '204': - description: No response body + '200': + content: + application/json: + schema: + type: array + items: + $ref: '#/components/schemas/UsedBy' + description: '' + '400': + content: + application/json: + schema: + $ref: '#/components/schemas/ValidationError' + description: '' + '403': + content: + application/json: + schema: + $ref: '#/components/schemas/GenericError' + description: '' + /stages/authenticator/mobile/: + get: + operationId: stages_authenticator_mobile_list + description: AuthenticatorMobileStage Viewset + parameters: + - in: query + name: configure_flow + schema: + type: string + format: uuid + - in: query + name: name + schema: + type: string + - name: ordering + required: false + in: query + description: Which field to use when ordering the results. + schema: + type: string + - name: page + required: false + in: query + description: A page number within the paginated result set. + schema: + type: integer + - name: page_size + required: false + in: query + description: Number of results to return per page. + schema: + type: integer + - name: search + required: false + in: query + description: A search term. + schema: + type: string + tags: + - stages + security: + - authentik: [] + responses: + '200': + content: + application/json: + schema: + $ref: '#/components/schemas/PaginatedAuthenticatorMobileStageList' + description: '' '400': content: application/json: @@ -22681,17 +23550,49 @@ paths: schema: $ref: '#/components/schemas/GenericError' description: '' - /stages/authenticator/duo/{stage_uuid}/enrollment_status/: post: - operationId: stages_authenticator_duo_enrollment_status_create - description: Check enrollment status of user details in current session + operationId: stages_authenticator_mobile_create + description: AuthenticatorMobileStage Viewset + tags: + - stages + requestBody: + content: + application/json: + schema: + $ref: '#/components/schemas/AuthenticatorMobileStageRequest' + required: true + security: + - authentik: [] + responses: + '201': + content: + application/json: + schema: + $ref: '#/components/schemas/AuthenticatorMobileStage' + description: '' + '400': + content: + application/json: + schema: + $ref: '#/components/schemas/ValidationError' + description: '' + '403': + content: + application/json: + schema: + $ref: '#/components/schemas/GenericError' + description: '' + /stages/authenticator/mobile/{stage_uuid}/: + get: + operationId: stages_authenticator_mobile_retrieve + description: AuthenticatorMobileStage Viewset parameters: - in: path name: stage_uuid schema: type: string format: uuid - description: A UUID string identifying this Duo Authenticator Setup Stage. + description: A UUID string identifying this Mobile Authenticator Setup Stage. required: true tags: - stages @@ -22702,7 +23603,7 @@ paths: content: application/json: schema: - $ref: '#/components/schemas/DuoDeviceEnrollmentStatus' + $ref: '#/components/schemas/AuthenticatorMobileStage' description: '' '400': content: @@ -22716,17 +23617,16 @@ paths: schema: $ref: '#/components/schemas/GenericError' description: '' - /stages/authenticator/duo/{stage_uuid}/import_device_manual/: - post: - operationId: stages_authenticator_duo_import_device_manual_create - description: Import duo devices into authentik + put: + operationId: stages_authenticator_mobile_update + description: AuthenticatorMobileStage Viewset parameters: - in: path name: stage_uuid schema: type: string format: uuid - description: A UUID string identifying this Duo Authenticator Setup Stage. + description: A UUID string identifying this Mobile Authenticator Setup Stage. required: true tags: - stages @@ -22734,35 +23634,47 @@ paths: content: application/json: schema: - $ref: '#/components/schemas/AuthenticatorDuoStageManualDeviceImportRequest' + $ref: '#/components/schemas/AuthenticatorMobileStageRequest' required: true security: - authentik: [] responses: - '204': - description: Enrollment successful + '200': + content: + application/json: + schema: + $ref: '#/components/schemas/AuthenticatorMobileStage' + description: '' '400': - description: Bad request + content: + application/json: + schema: + $ref: '#/components/schemas/ValidationError' + description: '' '403': content: application/json: schema: $ref: '#/components/schemas/GenericError' description: '' - /stages/authenticator/duo/{stage_uuid}/import_devices_automatic/: - post: - operationId: stages_authenticator_duo_import_devices_automatic_create - description: Import duo devices into authentik + patch: + operationId: stages_authenticator_mobile_partial_update + description: AuthenticatorMobileStage Viewset parameters: - in: path name: stage_uuid schema: type: string format: uuid - description: A UUID string identifying this Duo Authenticator Setup Stage. + description: A UUID string identifying this Mobile Authenticator Setup Stage. required: true tags: - stages + requestBody: + content: + application/json: + schema: + $ref: '#/components/schemas/PatchedAuthenticatorMobileStageRequest' security: - authentik: [] responses: @@ -22770,19 +23682,53 @@ paths: content: application/json: schema: - $ref: '#/components/schemas/AuthenticatorDuoStageDeviceImportResponse' + $ref: '#/components/schemas/AuthenticatorMobileStage' description: '' '400': - description: Bad request + content: + application/json: + schema: + $ref: '#/components/schemas/ValidationError' + description: '' '403': content: application/json: schema: $ref: '#/components/schemas/GenericError' description: '' - /stages/authenticator/duo/{stage_uuid}/used_by/: + delete: + operationId: stages_authenticator_mobile_destroy + description: AuthenticatorMobileStage Viewset + parameters: + - in: path + name: stage_uuid + schema: + type: string + format: uuid + description: A UUID string identifying this Mobile Authenticator Setup Stage. + required: true + tags: + - stages + security: + - authentik: [] + responses: + '204': + description: No response body + '400': + content: + application/json: + schema: + $ref: '#/components/schemas/ValidationError' + description: '' + '403': + content: + application/json: + schema: + $ref: '#/components/schemas/GenericError' + description: '' + /stages/authenticator/mobile/{stage_uuid}/used_by/: get: - operationId: stages_authenticator_duo_used_by_list + operationId: stages_authenticator_mobile_used_by_list description: Get a list of all objects that use this object parameters: - in: path @@ -22790,7 +23736,7 @@ paths: schema: type: string format: uuid - description: A UUID string identifying this Duo Authenticator Setup Stage. + description: A UUID string identifying this Mobile Authenticator Setup Stage. required: true tags: - stages @@ -23265,7 +24211,7 @@ paths: schema: type: string format: uuid - description: A UUID string identifying this Static Authenticator Stage. + description: A UUID string identifying this Static Authenticator Setup Stage. required: true tags: - stages @@ -23299,7 +24245,7 @@ paths: schema: type: string format: uuid - description: A UUID string identifying this Static Authenticator Stage. + description: A UUID string identifying this Static Authenticator Setup Stage. required: true tags: - stages @@ -23339,7 +24285,7 @@ paths: schema: type: string format: uuid - description: A UUID string identifying this Static Authenticator Stage. + description: A UUID string identifying this Static Authenticator Setup Stage. required: true tags: - stages @@ -23378,7 +24324,7 @@ paths: schema: type: string format: uuid - description: A UUID string identifying this Static Authenticator Stage. + description: A UUID string identifying this Static Authenticator Setup Stage. required: true tags: - stages @@ -23409,7 +24355,7 @@ paths: schema: type: string format: uuid - description: A UUID string identifying this Static Authenticator Stage. + description: A UUID string identifying this Static Authenticator Setup Stage. required: true tags: - stages @@ -29340,6 +30286,7 @@ components: - authentik.sources.saml - authentik.stages.authenticator - authentik.stages.authenticator_duo + - authentik.stages.authenticator_mobile - authentik.stages.authenticator_sms - authentik.stages.authenticator_static - authentik.stages.authenticator_totp @@ -29394,6 +30341,7 @@ components: * `authentik.sources.saml` - authentik Sources.SAML * `authentik.stages.authenticator` - authentik Stages.Authenticator * `authentik.stages.authenticator_duo` - authentik Stages.Authenticator.Duo + * `authentik.stages.authenticator_mobile` - authentik Stages.Authenticator.Mobile * `authentik.stages.authenticator_sms` - authentik Stages.Authenticator.SMS * `authentik.stages.authenticator_static` - authentik Stages.Authenticator.Static * `authentik.stages.authenticator_totp` - authentik Stages.Authenticator.TOTP @@ -29654,7 +30602,6 @@ components: friendly_name: type: string nullable: true - minLength: 1 user_verification: $ref: '#/components/schemas/UserVerificationEnum' authenticator_attachment: @@ -29965,7 +30912,6 @@ components: friendly_name: type: string nullable: true - minLength: 1 client_id: type: string minLength: 1 @@ -29986,6 +30932,136 @@ components: - client_id - client_secret - name + AuthenticatorMobileChallenge: + type: object + description: Mobile Challenge + properties: + type: + $ref: '#/components/schemas/ChallengeChoices' + flow_info: + $ref: '#/components/schemas/ContextualFlowInfo' + component: + type: string + default: ak-stage-authenticator-mobile + response_errors: + type: object + additionalProperties: + type: array + items: + $ref: '#/components/schemas/ErrorDetail' + pending_user: + type: string + pending_user_avatar: + type: string + payload: + $ref: '#/components/schemas/AuthenticatorMobilePayloadChallenge' + required: + - payload + - pending_user + - pending_user_avatar + - type + AuthenticatorMobileChallengeResponseRequest: + type: object + description: Pseudo class for mobile response + properties: + component: + type: string + minLength: 1 + default: ak-stage-authenticator-mobile + AuthenticatorMobilePayloadChallenge: + type: object + description: Payload within the QR code given to the mobile app, hence the short + variable names + properties: + u: + type: string + description: Server URL + s: + type: string + description: Stage UUID + t: + type: string + description: Initial Token + AuthenticatorMobileStage: + type: object + description: AuthenticatorMobileStage Serializer + properties: + pk: + type: string + format: uuid + readOnly: true + title: Stage uuid + name: + type: string + component: + type: string + description: Get object type so that we know how to edit the object + readOnly: true + verbose_name: + type: string + description: Return object's verbose_name + readOnly: true + verbose_name_plural: + type: string + description: Return object's plural verbose_name + readOnly: true + meta_model_name: + type: string + description: Return internal model name + readOnly: true + flow_set: + type: array + items: + $ref: '#/components/schemas/FlowSet' + configure_flow: + type: string + format: uuid + nullable: true + description: Flow used by an authenticated user to configure this Stage. + If empty, user will not be able to configure this stage. + friendly_name: + type: string + nullable: true + item_matching_mode: + $ref: '#/components/schemas/ItemMatchingModeEnum' + cgw_endpoint: + type: string + required: + - cgw_endpoint + - component + - meta_model_name + - name + - pk + - verbose_name + - verbose_name_plural + AuthenticatorMobileStageRequest: + type: object + description: AuthenticatorMobileStage Serializer + properties: + name: + type: string + minLength: 1 + flow_set: + type: array + items: + $ref: '#/components/schemas/FlowSetRequest' + configure_flow: + type: string + format: uuid + nullable: true + description: Flow used by an authenticated user to configure this Stage. + If empty, user will not be able to configure this stage. + friendly_name: + type: string + nullable: true + item_matching_mode: + $ref: '#/components/schemas/ItemMatchingModeEnum' + cgw_endpoint: + type: string + minLength: 1 + required: + - cgw_endpoint + - name AuthenticatorSMSChallenge: type: object description: SMS Setup challenge @@ -30120,7 +31196,6 @@ components: friendly_name: type: string nullable: true - minLength: 1 provider: $ref: '#/components/schemas/ProviderEnum' from_number: @@ -30265,7 +31340,6 @@ components: friendly_name: type: string nullable: true - minLength: 1 token_count: type: integer maximum: 2147483647 @@ -30386,7 +31460,6 @@ components: friendly_name: type: string nullable: true - minLength: 1 digits: $ref: '#/components/schemas/DigitsEnum' required: @@ -30556,6 +31629,9 @@ components: additionalProperties: {} duo: type: integer + mobile: + type: string + minLength: 1 AuthenticatorWebAuthnChallenge: type: object description: WebAuthn Challenge @@ -31128,6 +32204,7 @@ components: - $ref: '#/components/schemas/AccessDeniedChallenge' - $ref: '#/components/schemas/AppleLoginChallenge' - $ref: '#/components/schemas/AuthenticatorDuoChallenge' + - $ref: '#/components/schemas/AuthenticatorMobileChallenge' - $ref: '#/components/schemas/AuthenticatorSMSChallenge' - $ref: '#/components/schemas/AuthenticatorStaticChallenge' - $ref: '#/components/schemas/AuthenticatorTOTPChallenge' @@ -31154,6 +32231,7 @@ components: ak-stage-access-denied: '#/components/schemas/AccessDeniedChallenge' ak-source-oauth-apple: '#/components/schemas/AppleLoginChallenge' ak-stage-authenticator-duo: '#/components/schemas/AuthenticatorDuoChallenge' + ak-stage-authenticator-mobile: '#/components/schemas/AuthenticatorMobileChallenge' ak-stage-authenticator-sms: '#/components/schemas/AuthenticatorSMSChallenge' ak-stage-authenticator-static: '#/components/schemas/AuthenticatorStaticChallenge' ak-stage-authenticator-totp: '#/components/schemas/AuthenticatorTOTPChallenge' @@ -31514,7 +32592,7 @@ components: description: Return internal model name readOnly: true pk: - type: integer + type: string name: type: string type: @@ -31523,6 +32601,7 @@ components: readOnly: true confirmed: type: boolean + readOnly: true required: - confirmed - meta_model_name @@ -31570,6 +32649,7 @@ components: - webauthn - duo - sms + - mobile type: string description: |- * `static` - Static @@ -31577,6 +32657,7 @@ components: * `webauthn` - WebAuthn * `duo` - Duo * `sms` - SMS + * `mobile` - authentik Mobile DigestAlgorithmEnum: enum: - http://www.w3.org/2000/09/xmldsig#sha1 @@ -31881,17 +32962,37 @@ components: type: object description: Serializer for Duo authenticator devices properties: - pk: - type: integer + verbose_name: + type: string + description: Return object's verbose_name readOnly: true - title: ID + verbose_name_plural: + type: string + description: Return object's plural verbose_name + readOnly: true + meta_model_name: + type: string + description: Return internal model name + readOnly: true + pk: + type: string name: type: string - description: The human-readable name of this device. - maxLength: 64 + type: + type: string + description: Get type of device + readOnly: true + confirmed: + type: boolean + readOnly: true required: + - confirmed + - meta_model_name - name - pk + - type + - verbose_name + - verbose_name_plural DuoDeviceEnrollmentStatus: type: object properties: @@ -31903,13 +33004,15 @@ components: type: object description: Serializer for Duo authenticator devices properties: + pk: + type: string + minLength: 1 name: type: string minLength: 1 - description: The human-readable name of this device. - maxLength: 64 required: - name + - pk DuoResponseEnum: enum: - success @@ -32395,6 +33498,7 @@ components: * `authentik.sources.saml` - authentik Sources.SAML * `authentik.stages.authenticator` - authentik Stages.Authenticator * `authentik.stages.authenticator_duo` - authentik Stages.Authenticator.Duo + * `authentik.stages.authenticator_mobile` - authentik Stages.Authenticator.Mobile * `authentik.stages.authenticator_sms` - authentik Stages.Authenticator.SMS * `authentik.stages.authenticator_static` - authentik Stages.Authenticator.Static * `authentik.stages.authenticator_totp` - authentik Stages.Authenticator.TOTP @@ -32444,14 +33548,10 @@ components: * `authentik_policies_expression.expressionpolicy` - Expression Policy * `authentik_policies_password.passwordpolicy` - Password Policy * `authentik_policies_reputation.reputationpolicy` - Reputation Policy - * `authentik_policies_reputation.reputation` - Reputation Score * `authentik_policies.policybinding` - Policy Binding * `authentik_providers_ldap.ldapprovider` - LDAP Provider * `authentik_providers_oauth2.scopemapping` - Scope Mapping * `authentik_providers_oauth2.oauth2provider` - OAuth2/OpenID Provider - * `authentik_providers_oauth2.authorizationcode` - Authorization Code - * `authentik_providers_oauth2.accesstoken` - OAuth2 Access Token - * `authentik_providers_oauth2.refreshtoken` - OAuth2 Refresh Token * `authentik_providers_proxy.proxyprovider` - Proxy Provider * `authentik_providers_radius.radiusprovider` - Radius Provider * `authentik_providers_saml.samlprovider` - SAML Provider @@ -32469,9 +33569,11 @@ components: * `authentik_sources_saml.usersamlsourceconnection` - User SAML Source Connection * `authentik_stages_authenticator_duo.authenticatorduostage` - Duo Authenticator Setup Stage * `authentik_stages_authenticator_duo.duodevice` - Duo Device + * `authentik_stages_authenticator_mobile.authenticatormobilestage` - Mobile Authenticator Setup Stage + * `authentik_stages_authenticator_mobile.mobiledevice` - Mobile Device * `authentik_stages_authenticator_sms.authenticatorsmsstage` - SMS Authenticator Setup Stage * `authentik_stages_authenticator_sms.smsdevice` - SMS Device - * `authentik_stages_authenticator_static.authenticatorstaticstage` - Static Authenticator Stage + * `authentik_stages_authenticator_static.authenticatorstaticstage` - Static Authenticator Setup Stage * `authentik_stages_authenticator_static.staticdevice` - Static Device * `authentik_stages_authenticator_totp.authenticatortotpstage` - TOTP Authenticator Setup Stage * `authentik_stages_authenticator_totp.totpdevice` - TOTP Device @@ -32598,6 +33700,7 @@ components: * `authentik.sources.saml` - authentik Sources.SAML * `authentik.stages.authenticator` - authentik Stages.Authenticator * `authentik.stages.authenticator_duo` - authentik Stages.Authenticator.Duo + * `authentik.stages.authenticator_mobile` - authentik Stages.Authenticator.Mobile * `authentik.stages.authenticator_sms` - authentik Stages.Authenticator.SMS * `authentik.stages.authenticator_static` - authentik Stages.Authenticator.Static * `authentik.stages.authenticator_totp` - authentik Stages.Authenticator.TOTP @@ -32647,14 +33750,10 @@ components: * `authentik_policies_expression.expressionpolicy` - Expression Policy * `authentik_policies_password.passwordpolicy` - Password Policy * `authentik_policies_reputation.reputationpolicy` - Reputation Policy - * `authentik_policies_reputation.reputation` - Reputation Score * `authentik_policies.policybinding` - Policy Binding * `authentik_providers_ldap.ldapprovider` - LDAP Provider * `authentik_providers_oauth2.scopemapping` - Scope Mapping * `authentik_providers_oauth2.oauth2provider` - OAuth2/OpenID Provider - * `authentik_providers_oauth2.authorizationcode` - Authorization Code - * `authentik_providers_oauth2.accesstoken` - OAuth2 Access Token - * `authentik_providers_oauth2.refreshtoken` - OAuth2 Refresh Token * `authentik_providers_proxy.proxyprovider` - Proxy Provider * `authentik_providers_radius.radiusprovider` - Radius Provider * `authentik_providers_saml.samlprovider` - SAML Provider @@ -32672,9 +33771,11 @@ components: * `authentik_sources_saml.usersamlsourceconnection` - User SAML Source Connection * `authentik_stages_authenticator_duo.authenticatorduostage` - Duo Authenticator Setup Stage * `authentik_stages_authenticator_duo.duodevice` - Duo Device + * `authentik_stages_authenticator_mobile.authenticatormobilestage` - Mobile Authenticator Setup Stage + * `authentik_stages_authenticator_mobile.mobiledevice` - Mobile Device * `authentik_stages_authenticator_sms.authenticatorsmsstage` - SMS Authenticator Setup Stage * `authentik_stages_authenticator_sms.smsdevice` - SMS Device - * `authentik_stages_authenticator_static.authenticatorstaticstage` - Static Authenticator Stage + * `authentik_stages_authenticator_static.authenticatorstaticstage` - Static Authenticator Setup Stage * `authentik_stages_authenticator_static.staticdevice` - Static Device * `authentik_stages_authenticator_totp.authenticatortotpstage` - TOTP Authenticator Setup Stage * `authentik_stages_authenticator_totp.totpdevice` - TOTP Device @@ -33063,6 +34164,7 @@ components: oneOf: - $ref: '#/components/schemas/AppleChallengeResponseRequest' - $ref: '#/components/schemas/AuthenticatorDuoChallengeResponseRequest' + - $ref: '#/components/schemas/AuthenticatorMobileChallengeResponseRequest' - $ref: '#/components/schemas/AuthenticatorSMSChallengeResponseRequest' - $ref: '#/components/schemas/AuthenticatorStaticChallengeResponseRequest' - $ref: '#/components/schemas/AuthenticatorTOTPChallengeResponseRequest' @@ -33085,6 +34187,7 @@ components: mapping: ak-source-oauth-apple: '#/components/schemas/AppleChallengeResponseRequest' ak-stage-authenticator-duo: '#/components/schemas/AuthenticatorDuoChallengeResponseRequest' + ak-stage-authenticator-mobile: '#/components/schemas/AuthenticatorMobileChallengeResponseRequest' ak-stage-authenticator-sms: '#/components/schemas/AuthenticatorSMSChallengeResponseRequest' ak-stage-authenticator-static: '#/components/schemas/AuthenticatorStaticChallengeResponseRequest' ak-stage-authenticator-totp: '#/components/schemas/AuthenticatorTOTPChallengeResponseRequest' @@ -34073,6 +35176,16 @@ components: description: |- * `global` - Same identifier is used for all providers * `per_provider` - Each provider has a different issuer, based on the application slug. + ItemMatchingModeEnum: + enum: + - accept_deny + - number_matching_2 + - number_matching_3 + type: string + description: |- + * `accept_deny` - Accept Deny + * `number_matching_2` - Number Matching 2 + * `number_matching_3` - Number Matching 3 KubernetesServiceConnection: type: object description: KubernetesServiceConnection Serializer @@ -34787,7 +35900,7 @@ components: tasks: type: array items: - $ref: '#/components/schemas/Task' + $ref: '#/components/schemas/SystemTask' readOnly: true required: - is_running @@ -34946,6 +36059,173 @@ components: required: - labels - name + MobileDevice: + type: object + description: Serializer for Mobile authenticator devices + properties: + verbose_name: + type: string + description: Return object's verbose_name + readOnly: true + verbose_name_plural: + type: string + description: Return object's plural verbose_name + readOnly: true + meta_model_name: + type: string + description: Return internal model name + readOnly: true + pk: + type: string + name: + type: string + type: + type: string + description: Get type of device + readOnly: true + confirmed: + type: boolean + readOnly: true + state: + allOf: + - $ref: '#/components/schemas/MobileDeviceInfo' + readOnly: true + last_checkin: + type: string + format: date-time + readOnly: true + required: + - confirmed + - last_checkin + - meta_model_name + - name + - pk + - state + - type + - verbose_name + - verbose_name_plural + MobileDeviceCheckInRequest: + type: object + description: Check info into authentik + properties: + firebase_key: + type: string + minLength: 1 + info: + $ref: '#/components/schemas/MobileDeviceInfoRequest' + required: + - info + MobileDeviceEnrollmentCallback: + type: object + properties: + token: + type: string + required: + - token + MobileDeviceEnrollmentRequest: + type: object + description: Enrollment request, send the device's unique identifier + properties: + firebase_key: + type: string + minLength: 1 + device_uid: + type: string + minLength: 1 + info: + $ref: '#/components/schemas/MobileDeviceInfoRequest' + required: + - device_uid + - info + MobileDeviceEnrollmentStatus: + type: object + properties: + status: + $ref: '#/components/schemas/MobileDeviceEnrollmentStatusStatusEnum' + required: + - status + MobileDeviceEnrollmentStatusStatusEnum: + enum: + - success + - waiting + type: string + description: |- + * `success` - Success + * `waiting` - Waiting + MobileDeviceInfo: + type: object + description: Info about a mobile device + properties: + platform: + $ref: '#/components/schemas/PlatformEnum' + os_version: + type: string + model: + type: string + hostname: + type: string + app_version: + type: string + others: {} + required: + - app_version + - hostname + - model + - os_version + - others + - platform + MobileDeviceInfoRequest: + type: object + description: Info about a mobile device + properties: + platform: + $ref: '#/components/schemas/PlatformEnum' + os_version: + type: string + minLength: 1 + model: + type: string + minLength: 1 + hostname: + type: string + minLength: 1 + app_version: + type: string + minLength: 1 + others: {} + required: + - app_version + - hostname + - model + - os_version + - others + - platform + MobileDeviceRequest: + type: object + description: Serializer for Mobile authenticator devices + properties: + pk: + type: string + minLength: 1 + name: + type: string + minLength: 1 + required: + - name + - pk + MobileDeviceResponseRequest: + type: object + description: Response from push sent to phone + properties: + tx_id: + type: string + format: uuid + selected_item: + type: string + minLength: 1 + required: + - selected_item + - tx_id ModelEnum: enum: - authentik_tenants.domain @@ -34966,14 +36246,10 @@ components: - authentik_policies_expression.expressionpolicy - authentik_policies_password.passwordpolicy - authentik_policies_reputation.reputationpolicy - - authentik_policies_reputation.reputation - authentik_policies.policybinding - authentik_providers_ldap.ldapprovider - authentik_providers_oauth2.scopemapping - authentik_providers_oauth2.oauth2provider - - authentik_providers_oauth2.authorizationcode - - authentik_providers_oauth2.accesstoken - - authentik_providers_oauth2.refreshtoken - authentik_providers_proxy.proxyprovider - authentik_providers_radius.radiusprovider - authentik_providers_saml.samlprovider @@ -34991,6 +36267,8 @@ components: - authentik_sources_saml.usersamlsourceconnection - authentik_stages_authenticator_duo.authenticatorduostage - authentik_stages_authenticator_duo.duodevice + - authentik_stages_authenticator_mobile.authenticatormobilestage + - authentik_stages_authenticator_mobile.mobiledevice - authentik_stages_authenticator_sms.authenticatorsmsstage - authentik_stages_authenticator_sms.smsdevice - authentik_stages_authenticator_static.authenticatorstaticstage @@ -35046,14 +36324,10 @@ components: * `authentik_policies_expression.expressionpolicy` - Expression Policy * `authentik_policies_password.passwordpolicy` - Password Policy * `authentik_policies_reputation.reputationpolicy` - Reputation Policy - * `authentik_policies_reputation.reputation` - Reputation Score * `authentik_policies.policybinding` - Policy Binding * `authentik_providers_ldap.ldapprovider` - LDAP Provider * `authentik_providers_oauth2.scopemapping` - Scope Mapping * `authentik_providers_oauth2.oauth2provider` - OAuth2/OpenID Provider - * `authentik_providers_oauth2.authorizationcode` - Authorization Code - * `authentik_providers_oauth2.accesstoken` - OAuth2 Access Token - * `authentik_providers_oauth2.refreshtoken` - OAuth2 Refresh Token * `authentik_providers_proxy.proxyprovider` - Proxy Provider * `authentik_providers_radius.radiusprovider` - Radius Provider * `authentik_providers_saml.samlprovider` - SAML Provider @@ -35071,9 +36345,11 @@ components: * `authentik_sources_saml.usersamlsourceconnection` - User SAML Source Connection * `authentik_stages_authenticator_duo.authenticatorduostage` - Duo Authenticator Setup Stage * `authentik_stages_authenticator_duo.duodevice` - Duo Device + * `authentik_stages_authenticator_mobile.authenticatormobilestage` - Mobile Authenticator Setup Stage + * `authentik_stages_authenticator_mobile.mobiledevice` - Mobile Device * `authentik_stages_authenticator_sms.authenticatorsmsstage` - SMS Authenticator Setup Stage * `authentik_stages_authenticator_sms.smsdevice` - SMS Device - * `authentik_stages_authenticator_static.authenticatorstaticstage` - Static Authenticator Stage + * `authentik_stages_authenticator_static.authenticatorstaticstage` - Static Authenticator Setup Stage * `authentik_stages_authenticator_static.staticdevice` - Static Device * `authentik_stages_authenticator_totp.authenticatortotpstage` - TOTP Authenticator Setup Stage * `authentik_stages_authenticator_totp.totpdevice` - TOTP Device @@ -36147,6 +37423,18 @@ components: required: - pagination - results + PaginatedAuthenticatorMobileStageList: + type: object + properties: + pagination: + $ref: '#/components/schemas/Pagination' + results: + type: array + items: + $ref: '#/components/schemas/AuthenticatorMobileStage' + required: + - pagination + - results PaginatedAuthenticatorSMSStageList: type: object properties: @@ -36567,6 +37855,18 @@ components: required: - pagination - results + PaginatedMobileDeviceList: + type: object + properties: + pagination: + $ref: '#/components/schemas/Pagination' + results: + type: array + items: + $ref: '#/components/schemas/MobileDevice' + required: + - pagination + - results PaginatedNotificationList: type: object properties: @@ -37047,6 +38347,18 @@ components: required: - pagination - results + PaginatedSystemTaskList: + type: object + properties: + pagination: + $ref: '#/components/schemas/Pagination' + results: + type: array + items: + $ref: '#/components/schemas/SystemTask' + required: + - pagination + - results PaginatedTOTPDeviceList: type: object properties: @@ -37652,7 +38964,6 @@ components: friendly_name: type: string nullable: true - minLength: 1 user_verification: $ref: '#/components/schemas/UserVerificationEnum' authenticator_attachment: @@ -37681,7 +38992,6 @@ components: friendly_name: type: string nullable: true - minLength: 1 client_id: type: string minLength: 1 @@ -37697,6 +39007,31 @@ components: admin_secret_key: type: string writeOnly: true + PatchedAuthenticatorMobileStageRequest: + type: object + description: AuthenticatorMobileStage Serializer + properties: + name: + type: string + minLength: 1 + flow_set: + type: array + items: + $ref: '#/components/schemas/FlowSetRequest' + configure_flow: + type: string + format: uuid + nullable: true + description: Flow used by an authenticated user to configure this Stage. + If empty, user will not be able to configure this stage. + friendly_name: + type: string + nullable: true + item_matching_mode: + $ref: '#/components/schemas/ItemMatchingModeEnum' + cgw_endpoint: + type: string + minLength: 1 PatchedAuthenticatorSMSStageRequest: type: object description: AuthenticatorSMSStage Serializer @@ -37717,7 +39052,6 @@ components: friendly_name: type: string nullable: true - minLength: 1 provider: $ref: '#/components/schemas/ProviderEnum' from_number: @@ -37763,7 +39097,6 @@ components: friendly_name: type: string nullable: true - minLength: 1 token_count: type: integer maximum: 2147483647 @@ -37792,7 +39125,6 @@ components: friendly_name: type: string nullable: true - minLength: 1 digits: $ref: '#/components/schemas/DigitsEnum' PatchedAuthenticatorValidateStageRequest: @@ -38054,11 +39386,12 @@ components: type: object description: Serializer for Duo authenticator devices properties: + pk: + type: string + minLength: 1 name: type: string minLength: 1 - description: The human-readable name of this device. - maxLength: 64 PatchedEmailStageRequest: type: object description: EmailStage Serializer @@ -38225,6 +39558,7 @@ components: * `authentik.sources.saml` - authentik Sources.SAML * `authentik.stages.authenticator` - authentik Stages.Authenticator * `authentik.stages.authenticator_duo` - authentik Stages.Authenticator.Duo + * `authentik.stages.authenticator_mobile` - authentik Stages.Authenticator.Mobile * `authentik.stages.authenticator_sms` - authentik Stages.Authenticator.SMS * `authentik.stages.authenticator_static` - authentik Stages.Authenticator.Static * `authentik.stages.authenticator_totp` - authentik Stages.Authenticator.TOTP @@ -38274,14 +39608,10 @@ components: * `authentik_policies_expression.expressionpolicy` - Expression Policy * `authentik_policies_password.passwordpolicy` - Password Policy * `authentik_policies_reputation.reputationpolicy` - Reputation Policy - * `authentik_policies_reputation.reputation` - Reputation Score * `authentik_policies.policybinding` - Policy Binding * `authentik_providers_ldap.ldapprovider` - LDAP Provider * `authentik_providers_oauth2.scopemapping` - Scope Mapping * `authentik_providers_oauth2.oauth2provider` - OAuth2/OpenID Provider - * `authentik_providers_oauth2.authorizationcode` - Authorization Code - * `authentik_providers_oauth2.accesstoken` - OAuth2 Access Token - * `authentik_providers_oauth2.refreshtoken` - OAuth2 Refresh Token * `authentik_providers_proxy.proxyprovider` - Proxy Provider * `authentik_providers_radius.radiusprovider` - Radius Provider * `authentik_providers_saml.samlprovider` - SAML Provider @@ -38299,9 +39629,11 @@ components: * `authentik_sources_saml.usersamlsourceconnection` - User SAML Source Connection * `authentik_stages_authenticator_duo.authenticatorduostage` - Duo Authenticator Setup Stage * `authentik_stages_authenticator_duo.duodevice` - Duo Device + * `authentik_stages_authenticator_mobile.authenticatormobilestage` - Mobile Authenticator Setup Stage + * `authentik_stages_authenticator_mobile.mobiledevice` - Mobile Device * `authentik_stages_authenticator_sms.authenticatorsmsstage` - SMS Authenticator Setup Stage * `authentik_stages_authenticator_sms.smsdevice` - SMS Device - * `authentik_stages_authenticator_static.authenticatorstaticstage` - Static Authenticator Stage + * `authentik_stages_authenticator_static.authenticatorstaticstage` - Static Authenticator Setup Stage * `authentik_stages_authenticator_static.staticdevice` - Static Device * `authentik_stages_authenticator_totp.authenticatortotpstage` - TOTP Authenticator Setup Stage * `authentik_stages_authenticator_totp.totpdevice` - TOTP Device @@ -38812,6 +40144,16 @@ components: key: type: string minLength: 1 + PatchedMobileDeviceRequest: + type: object + description: Serializer for Mobile authenticator devices + properties: + pk: + type: string + minLength: 1 + name: + type: string + minLength: 1 PatchedNotificationRequest: type: object description: Notification Serializer @@ -39845,11 +41187,12 @@ components: type: object description: Serializer for sms authenticator devices properties: + pk: + type: string + minLength: 1 name: type: string minLength: 1 - description: The human-readable name of this device. - maxLength: 64 PatchedScopeMappingRequest: type: object description: ScopeMapping Serializer @@ -39912,20 +41255,22 @@ components: type: object description: Serializer for static authenticator devices properties: + pk: + type: string + minLength: 1 name: type: string minLength: 1 - description: The human-readable name of this device. - maxLength: 64 PatchedTOTPDeviceRequest: type: object description: Serializer for totp authenticator devices properties: + pk: + type: string + minLength: 1 name: type: string minLength: 1 - description: The human-readable name of this device. - maxLength: 64 PatchedTenantRequest: type: object description: Tenant Serializer @@ -40125,10 +41470,12 @@ components: type: object description: Serializer for WebAuthn authenticator devices properties: + pk: + type: string + minLength: 1 name: type: string minLength: 1 - maxLength: 200 Permission: type: object description: Global permission @@ -40181,6 +41528,16 @@ components: minLength: 1 required: - permissions + PlatformEnum: + enum: + - ios + - android + - other + type: string + description: |- + * `ios` - iOS + * `android` - Android + * `other` - Other PlexAuthenticationChallenge: type: object description: Challenge shown to the user in identification stage @@ -42794,7 +44151,7 @@ components: tasks: type: array items: - $ref: '#/components/schemas/Task' + $ref: '#/components/schemas/SystemTask' readOnly: true required: - is_running @@ -42803,32 +44160,50 @@ components: type: object description: Serializer for sms authenticator devices properties: - name: + verbose_name: type: string - description: The human-readable name of this device. - maxLength: 64 - pk: - type: integer + description: Return object's verbose_name readOnly: true - title: ID - phone_number: + verbose_name_plural: type: string + description: Return object's plural verbose_name + readOnly: true + meta_model_name: + type: string + description: Return internal model name + readOnly: true + pk: + type: string + name: + type: string + type: + type: string + description: Get type of device + readOnly: true + confirmed: + type: boolean readOnly: true required: + - confirmed + - meta_model_name - name - - phone_number - pk + - type + - verbose_name + - verbose_name_plural SMSDeviceRequest: type: object description: Serializer for sms authenticator devices properties: + pk: + type: string + minLength: 1 name: type: string minLength: 1 - description: The human-readable name of this device. - maxLength: 64 required: - name + - pk ScopeMapping: type: object description: ScopeMapping Serializer @@ -43386,34 +44761,56 @@ components: type: object description: Serializer for static authenticator devices properties: + verbose_name: + type: string + description: Return object's verbose_name + readOnly: true + verbose_name_plural: + type: string + description: Return object's plural verbose_name + readOnly: true + meta_model_name: + type: string + description: Return internal model name + readOnly: true + pk: + type: string name: type: string - description: The human-readable name of this device. - maxLength: 64 + type: + type: string + description: Get type of device + readOnly: true + confirmed: + type: boolean + readOnly: true token_set: type: array items: $ref: '#/components/schemas/StaticDeviceToken' readOnly: true - pk: - type: integer - readOnly: true - title: ID required: + - confirmed + - meta_model_name - name - pk - token_set + - type + - verbose_name + - verbose_name_plural StaticDeviceRequest: type: object description: Serializer for static authenticator devices properties: + pk: + type: string + minLength: 1 name: type: string minLength: 1 - description: The human-readable name of this device. - maxLength: 64 required: - name + - pk StaticDeviceToken: type: object description: Serializer for static device's tokens @@ -43517,71 +44914,112 @@ components: - http_is_secure - runtime - server_time - TOTPDevice: + SystemTask: type: object - description: Serializer for totp authenticator devices + description: Serialize TaskInfo and TaskResult properties: - name: + uuid: type: string - description: The human-readable name of this device. - maxLength: 64 - pk: - type: integer + format: uuid readOnly: true - title: ID - required: - - name - - pk - TOTPDeviceRequest: - type: object - description: Serializer for totp authenticator devices - properties: name: type: string - minLength: 1 - description: The human-readable name of this device. - maxLength: 64 - required: - - name - Task: - type: object - description: Serialize TaskInfo and TaskResult - properties: - task_name: + full_name: + type: string + description: Get full name with UID + readOnly: true + uid: type: string - task_description: + description: type: string - task_finish_timestamp: + start_timestamp: type: string format: date-time - task_duration: - type: integer - description: Get the duration a task took to run + readOnly: true + finish_timestamp: + type: string + format: date-time + readOnly: true + duration: + type: number + format: double readOnly: true status: - $ref: '#/components/schemas/TaskStatusEnum' + $ref: '#/components/schemas/SystemTaskStatusEnum' messages: type: array - items: {} + items: + type: string required: + - description + - duration + - finish_timestamp + - full_name - messages + - name + - start_timestamp - status - - task_description - - task_duration - - task_finish_timestamp - - task_name - TaskStatusEnum: + - uuid + SystemTaskStatusEnum: enum: - - SUCCESSFUL - - WARNING - - ERROR - - UNKNOWN + - unknown + - successful + - warning + - error type: string description: |- - * `SUCCESSFUL` - SUCCESSFUL - * `WARNING` - WARNING - * `ERROR` - ERROR - * `UNKNOWN` - UNKNOWN + * `unknown` - UNKNOWN + * `successful` - SUCCESSFUL + * `warning` - WARNING + * `error` - ERROR + TOTPDevice: + type: object + description: Serializer for totp authenticator devices + properties: + verbose_name: + type: string + description: Return object's verbose_name + readOnly: true + verbose_name_plural: + type: string + description: Return object's plural verbose_name + readOnly: true + meta_model_name: + type: string + description: Return internal model name + readOnly: true + pk: + type: string + name: + type: string + type: + type: string + description: Get type of device + readOnly: true + confirmed: + type: boolean + readOnly: true + required: + - confirmed + - meta_model_name + - name + - pk + - type + - verbose_name + - verbose_name_plural + TOTPDeviceRequest: + type: object + description: Serializer for totp authenticator devices + properties: + pk: + type: string + minLength: 1 + name: + type: string + minLength: 1 + required: + - name + - pk Tenant: type: object description: Tenant Serializer @@ -43853,16 +45291,16 @@ components: - pk UsedByActionEnum: enum: - - CASCADE - - CASCADE_MANY - - SET_NULL - - SET_DEFAULT + - cascade + - cascade_many + - set_null + - set_default type: string description: |- - * `CASCADE` - CASCADE - * `CASCADE_MANY` - CASCADE_MANY - * `SET_NULL` - SET_NULL - * `SET_DEFAULT` - SET_DEFAULT + * `cascade` - CASCADE + * `cascade_many` - CASCADE_MANY + * `set_null` - SET_NULL + * `set_default` - SET_DEFAULT User: type: object description: User Serializer @@ -43906,6 +45344,7 @@ components: maxLength: 254 avatar: type: string + description: User's avatar, either a http/https URL or a data URI readOnly: true attributes: type: object @@ -44577,6 +46016,7 @@ components: maxLength: 254 avatar: type: string + description: User's avatar, either a http/https URL or a data URI readOnly: true uid: type: string @@ -44836,31 +46276,50 @@ components: type: object description: Serializer for WebAuthn authenticator devices properties: - pk: - type: integer + verbose_name: + type: string + description: Return object's verbose_name readOnly: true - title: ID + verbose_name_plural: + type: string + description: Return object's plural verbose_name + readOnly: true + meta_model_name: + type: string + description: Return internal model name + readOnly: true + pk: + type: string name: type: string - maxLength: 200 - created_on: + type: type: string - format: date-time + description: Get type of device + readOnly: true + confirmed: + type: boolean readOnly: true required: - - created_on + - confirmed + - meta_model_name - name - pk + - type + - verbose_name + - verbose_name_plural WebAuthnDeviceRequest: type: object description: Serializer for WebAuthn authenticator devices properties: + pk: + type: string + minLength: 1 name: type: string minLength: 1 - maxLength: 200 required: - name + - pk Workers: type: object properties: @@ -44893,5 +46352,10 @@ components: in: header name: Authorization scheme: bearer + mobile_device_token: + type: apiKey + in: header + name: Authorization + scheme: bearer servers: - url: /api/v3/ diff --git a/src/main/kotlin/io/goauthentik/api/apis/AdminApi.kt b/src/main/kotlin/io/goauthentik/api/apis/AdminApi.kt index 93c4ac4..91cd394 100644 --- a/src/main/kotlin/io/goauthentik/api/apis/AdminApi.kt +++ b/src/main/kotlin/io/goauthentik/api/apis/AdminApi.kt @@ -26,7 +26,6 @@ import io.goauthentik.api.models.PatchedSettingsRequest import io.goauthentik.api.models.Settings import io.goauthentik.api.models.SettingsRequest import io.goauthentik.api.models.SystemInfo -import io.goauthentik.api.models.Task import io.goauthentik.api.models.ValidationError import io.goauthentik.api.models.Version import io.goauthentik.api.models.Workers @@ -607,214 +606,6 @@ class AdminApi(basePath: kotlin.String = defaultBasePath, client: OkHttpClient = ) } - /** - * - * List system tasks - * @return kotlin.collections.List - * @throws IllegalStateException If the request is not correctly configured - * @throws IOException Rethrows the OkHttp execute method exception - * @throws UnsupportedOperationException If the API returns an informational or redirection response - * @throws ClientException If the API returns a client error response - * @throws ServerException If the API returns a server error response - */ - @Suppress("UNCHECKED_CAST") - @Throws(IllegalStateException::class, IOException::class, UnsupportedOperationException::class, ClientException::class, ServerException::class) - fun adminSystemTasksList() : kotlin.collections.List { - val localVarResponse = adminSystemTasksListWithHttpInfo() - - return when (localVarResponse.responseType) { - ResponseType.Success -> (localVarResponse as Success<*>).data as kotlin.collections.List - ResponseType.Informational -> throw UnsupportedOperationException("Client does not support Informational responses.") - ResponseType.Redirection -> throw UnsupportedOperationException("Client does not support Redirection responses.") - ResponseType.ClientError -> { - val localVarError = localVarResponse as ClientError<*> - throw ClientException("Client error : ${localVarError.statusCode} ${localVarError.message.orEmpty()}", localVarError.statusCode, localVarResponse) - } - ResponseType.ServerError -> { - val localVarError = localVarResponse as ServerError<*> - throw ServerException("Server error : ${localVarError.statusCode} ${localVarError.message.orEmpty()} ${localVarError.body}", localVarError.statusCode, localVarResponse) - } - } - } - - /** - * - * List system tasks - * @return ApiResponse?> - * @throws IllegalStateException If the request is not correctly configured - * @throws IOException Rethrows the OkHttp execute method exception - */ - @Suppress("UNCHECKED_CAST") - @Throws(IllegalStateException::class, IOException::class) - fun adminSystemTasksListWithHttpInfo() : ApiResponse?> { - val localVariableConfig = adminSystemTasksListRequestConfig() - - return request>( - localVariableConfig - ) - } - - /** - * To obtain the request config of the operation adminSystemTasksList - * - * @return RequestConfig - */ - fun adminSystemTasksListRequestConfig() : RequestConfig { - val localVariableBody = null - val localVariableQuery: MultiValueMap = mutableMapOf() - val localVariableHeaders: MutableMap = mutableMapOf() - localVariableHeaders["Accept"] = "application/json" - - return RequestConfig( - method = RequestMethod.GET, - path = "/admin/system_tasks/", - query = localVariableQuery, - headers = localVariableHeaders, - requiresAuthentication = true, - body = localVariableBody - ) - } - - /** - * - * Get a single system task - * @param id - * @return Task - * @throws IllegalStateException If the request is not correctly configured - * @throws IOException Rethrows the OkHttp execute method exception - * @throws UnsupportedOperationException If the API returns an informational or redirection response - * @throws ClientException If the API returns a client error response - * @throws ServerException If the API returns a server error response - */ - @Suppress("UNCHECKED_CAST") - @Throws(IllegalStateException::class, IOException::class, UnsupportedOperationException::class, ClientException::class, ServerException::class) - fun adminSystemTasksRetrieve(id: kotlin.String) : Task { - val localVarResponse = adminSystemTasksRetrieveWithHttpInfo(id = id) - - return when (localVarResponse.responseType) { - ResponseType.Success -> (localVarResponse as Success<*>).data as Task - ResponseType.Informational -> throw UnsupportedOperationException("Client does not support Informational responses.") - ResponseType.Redirection -> throw UnsupportedOperationException("Client does not support Redirection responses.") - ResponseType.ClientError -> { - val localVarError = localVarResponse as ClientError<*> - throw ClientException("Client error : ${localVarError.statusCode} ${localVarError.message.orEmpty()}", localVarError.statusCode, localVarResponse) - } - ResponseType.ServerError -> { - val localVarError = localVarResponse as ServerError<*> - throw ServerException("Server error : ${localVarError.statusCode} ${localVarError.message.orEmpty()} ${localVarError.body}", localVarError.statusCode, localVarResponse) - } - } - } - - /** - * - * Get a single system task - * @param id - * @return ApiResponse - * @throws IllegalStateException If the request is not correctly configured - * @throws IOException Rethrows the OkHttp execute method exception - */ - @Suppress("UNCHECKED_CAST") - @Throws(IllegalStateException::class, IOException::class) - fun adminSystemTasksRetrieveWithHttpInfo(id: kotlin.String) : ApiResponse { - val localVariableConfig = adminSystemTasksRetrieveRequestConfig(id = id) - - return request( - localVariableConfig - ) - } - - /** - * To obtain the request config of the operation adminSystemTasksRetrieve - * - * @param id - * @return RequestConfig - */ - fun adminSystemTasksRetrieveRequestConfig(id: kotlin.String) : RequestConfig { - val localVariableBody = null - val localVariableQuery: MultiValueMap = mutableMapOf() - val localVariableHeaders: MutableMap = mutableMapOf() - localVariableHeaders["Accept"] = "application/json" - - return RequestConfig( - method = RequestMethod.GET, - path = "/admin/system_tasks/{id}/".replace("{"+"id"+"}", encodeURIComponent(id.toString())), - query = localVariableQuery, - headers = localVariableHeaders, - requiresAuthentication = true, - body = localVariableBody - ) - } - - /** - * - * Retry task - * @param id - * @return void - * @throws IllegalStateException If the request is not correctly configured - * @throws IOException Rethrows the OkHttp execute method exception - * @throws UnsupportedOperationException If the API returns an informational or redirection response - * @throws ClientException If the API returns a client error response - * @throws ServerException If the API returns a server error response - */ - @Throws(IllegalStateException::class, IOException::class, UnsupportedOperationException::class, ClientException::class, ServerException::class) - fun adminSystemTasksRetryCreate(id: kotlin.String) : Unit { - val localVarResponse = adminSystemTasksRetryCreateWithHttpInfo(id = id) - - return when (localVarResponse.responseType) { - ResponseType.Success -> Unit - ResponseType.Informational -> throw UnsupportedOperationException("Client does not support Informational responses.") - ResponseType.Redirection -> throw UnsupportedOperationException("Client does not support Redirection responses.") - ResponseType.ClientError -> { - val localVarError = localVarResponse as ClientError<*> - throw ClientException("Client error : ${localVarError.statusCode} ${localVarError.message.orEmpty()}", localVarError.statusCode, localVarResponse) - } - ResponseType.ServerError -> { - val localVarError = localVarResponse as ServerError<*> - throw ServerException("Server error : ${localVarError.statusCode} ${localVarError.message.orEmpty()} ${localVarError.body}", localVarError.statusCode, localVarResponse) - } - } - } - - /** - * - * Retry task - * @param id - * @return ApiResponse - * @throws IllegalStateException If the request is not correctly configured - * @throws IOException Rethrows the OkHttp execute method exception - */ - @Throws(IllegalStateException::class, IOException::class) - fun adminSystemTasksRetryCreateWithHttpInfo(id: kotlin.String) : ApiResponse { - val localVariableConfig = adminSystemTasksRetryCreateRequestConfig(id = id) - - return request( - localVariableConfig - ) - } - - /** - * To obtain the request config of the operation adminSystemTasksRetryCreate - * - * @param id - * @return RequestConfig - */ - fun adminSystemTasksRetryCreateRequestConfig(id: kotlin.String) : RequestConfig { - val localVariableBody = null - val localVariableQuery: MultiValueMap = mutableMapOf() - val localVariableHeaders: MutableMap = mutableMapOf() - localVariableHeaders["Accept"] = "application/json" - - return RequestConfig( - method = RequestMethod.POST, - path = "/admin/system_tasks/{id}/retry/".replace("{"+"id"+"}", encodeURIComponent(id.toString())), - query = localVariableQuery, - headers = localVariableHeaders, - requiresAuthentication = true, - body = localVariableBody - ) - } - /** * * Get running and latest version. diff --git a/src/main/kotlin/io/goauthentik/api/apis/AuthenticatorsApi.kt b/src/main/kotlin/io/goauthentik/api/apis/AuthenticatorsApi.kt index 2a5c84d..88c22da 100644 --- a/src/main/kotlin/io/goauthentik/api/apis/AuthenticatorsApi.kt +++ b/src/main/kotlin/io/goauthentik/api/apis/AuthenticatorsApi.kt @@ -23,12 +23,21 @@ import io.goauthentik.api.models.Device import io.goauthentik.api.models.DuoDevice import io.goauthentik.api.models.DuoDeviceRequest import io.goauthentik.api.models.GenericError +import io.goauthentik.api.models.MobileDevice +import io.goauthentik.api.models.MobileDeviceCheckInRequest +import io.goauthentik.api.models.MobileDeviceEnrollmentCallback +import io.goauthentik.api.models.MobileDeviceEnrollmentRequest +import io.goauthentik.api.models.MobileDeviceEnrollmentStatus +import io.goauthentik.api.models.MobileDeviceRequest +import io.goauthentik.api.models.MobileDeviceResponseRequest import io.goauthentik.api.models.PaginatedDuoDeviceList +import io.goauthentik.api.models.PaginatedMobileDeviceList import io.goauthentik.api.models.PaginatedSMSDeviceList import io.goauthentik.api.models.PaginatedStaticDeviceList import io.goauthentik.api.models.PaginatedTOTPDeviceList import io.goauthentik.api.models.PaginatedWebAuthnDeviceList import io.goauthentik.api.models.PatchedDuoDeviceRequest +import io.goauthentik.api.models.PatchedMobileDeviceRequest import io.goauthentik.api.models.PatchedSMSDeviceRequest import io.goauthentik.api.models.PatchedStaticDeviceRequest import io.goauthentik.api.models.PatchedTOTPDeviceRequest @@ -608,9 +617,9 @@ class AuthenticatorsApi(basePath: kotlin.String = defaultBasePath, client: OkHtt /** * - * Viewset for sms authenticator devices (for admins) - * @param smSDeviceRequest - * @return SMSDevice + * Viewset for Mobile authenticator devices (for admins) + * @param mobileDeviceRequest + * @return MobileDevice * @throws IllegalStateException If the request is not correctly configured * @throws IOException Rethrows the OkHttp execute method exception * @throws UnsupportedOperationException If the API returns an informational or redirection response @@ -619,11 +628,11 @@ class AuthenticatorsApi(basePath: kotlin.String = defaultBasePath, client: OkHtt */ @Suppress("UNCHECKED_CAST") @Throws(IllegalStateException::class, IOException::class, UnsupportedOperationException::class, ClientException::class, ServerException::class) - fun authenticatorsAdminSmsCreate(smSDeviceRequest: SMSDeviceRequest) : SMSDevice { - val localVarResponse = authenticatorsAdminSmsCreateWithHttpInfo(smSDeviceRequest = smSDeviceRequest) + fun authenticatorsAdminMobileCreate(mobileDeviceRequest: MobileDeviceRequest) : MobileDevice { + val localVarResponse = authenticatorsAdminMobileCreateWithHttpInfo(mobileDeviceRequest = mobileDeviceRequest) return when (localVarResponse.responseType) { - ResponseType.Success -> (localVarResponse as Success<*>).data as SMSDevice + ResponseType.Success -> (localVarResponse as Success<*>).data as MobileDevice ResponseType.Informational -> throw UnsupportedOperationException("Client does not support Informational responses.") ResponseType.Redirection -> throw UnsupportedOperationException("Client does not support Redirection responses.") ResponseType.ClientError -> { @@ -639,30 +648,30 @@ class AuthenticatorsApi(basePath: kotlin.String = defaultBasePath, client: OkHtt /** * - * Viewset for sms authenticator devices (for admins) - * @param smSDeviceRequest - * @return ApiResponse + * Viewset for Mobile authenticator devices (for admins) + * @param mobileDeviceRequest + * @return ApiResponse * @throws IllegalStateException If the request is not correctly configured * @throws IOException Rethrows the OkHttp execute method exception */ @Suppress("UNCHECKED_CAST") @Throws(IllegalStateException::class, IOException::class) - fun authenticatorsAdminSmsCreateWithHttpInfo(smSDeviceRequest: SMSDeviceRequest) : ApiResponse { - val localVariableConfig = authenticatorsAdminSmsCreateRequestConfig(smSDeviceRequest = smSDeviceRequest) + fun authenticatorsAdminMobileCreateWithHttpInfo(mobileDeviceRequest: MobileDeviceRequest) : ApiResponse { + val localVariableConfig = authenticatorsAdminMobileCreateRequestConfig(mobileDeviceRequest = mobileDeviceRequest) - return request( + return request( localVariableConfig ) } /** - * To obtain the request config of the operation authenticatorsAdminSmsCreate + * To obtain the request config of the operation authenticatorsAdminMobileCreate * - * @param smSDeviceRequest + * @param mobileDeviceRequest * @return RequestConfig */ - fun authenticatorsAdminSmsCreateRequestConfig(smSDeviceRequest: SMSDeviceRequest) : RequestConfig { - val localVariableBody = smSDeviceRequest + fun authenticatorsAdminMobileCreateRequestConfig(mobileDeviceRequest: MobileDeviceRequest) : RequestConfig { + val localVariableBody = mobileDeviceRequest val localVariableQuery: MultiValueMap = mutableMapOf() val localVariableHeaders: MutableMap = mutableMapOf() localVariableHeaders["Content-Type"] = "application/json" @@ -670,7 +679,7 @@ class AuthenticatorsApi(basePath: kotlin.String = defaultBasePath, client: OkHtt return RequestConfig( method = RequestMethod.POST, - path = "/authenticators/admin/sms/", + path = "/authenticators/admin/mobile/", query = localVariableQuery, headers = localVariableHeaders, requiresAuthentication = true, @@ -680,8 +689,8 @@ class AuthenticatorsApi(basePath: kotlin.String = defaultBasePath, client: OkHtt /** * - * Viewset for sms authenticator devices (for admins) - * @param id A unique integer value identifying this SMS Device. + * Viewset for Mobile authenticator devices (for admins) + * @param uuid A UUID string identifying this Mobile Device. * @return void * @throws IllegalStateException If the request is not correctly configured * @throws IOException Rethrows the OkHttp execute method exception @@ -690,8 +699,8 @@ class AuthenticatorsApi(basePath: kotlin.String = defaultBasePath, client: OkHtt * @throws ServerException If the API returns a server error response */ @Throws(IllegalStateException::class, IOException::class, UnsupportedOperationException::class, ClientException::class, ServerException::class) - fun authenticatorsAdminSmsDestroy(id: kotlin.Int) : Unit { - val localVarResponse = authenticatorsAdminSmsDestroyWithHttpInfo(id = id) + fun authenticatorsAdminMobileDestroy(uuid: java.util.UUID) : Unit { + val localVarResponse = authenticatorsAdminMobileDestroyWithHttpInfo(uuid = uuid) return when (localVarResponse.responseType) { ResponseType.Success -> Unit @@ -710,15 +719,15 @@ class AuthenticatorsApi(basePath: kotlin.String = defaultBasePath, client: OkHtt /** * - * Viewset for sms authenticator devices (for admins) - * @param id A unique integer value identifying this SMS Device. + * Viewset for Mobile authenticator devices (for admins) + * @param uuid A UUID string identifying this Mobile Device. * @return ApiResponse * @throws IllegalStateException If the request is not correctly configured * @throws IOException Rethrows the OkHttp execute method exception */ @Throws(IllegalStateException::class, IOException::class) - fun authenticatorsAdminSmsDestroyWithHttpInfo(id: kotlin.Int) : ApiResponse { - val localVariableConfig = authenticatorsAdminSmsDestroyRequestConfig(id = id) + fun authenticatorsAdminMobileDestroyWithHttpInfo(uuid: java.util.UUID) : ApiResponse { + val localVariableConfig = authenticatorsAdminMobileDestroyRequestConfig(uuid = uuid) return request( localVariableConfig @@ -726,12 +735,12 @@ class AuthenticatorsApi(basePath: kotlin.String = defaultBasePath, client: OkHtt } /** - * To obtain the request config of the operation authenticatorsAdminSmsDestroy + * To obtain the request config of the operation authenticatorsAdminMobileDestroy * - * @param id A unique integer value identifying this SMS Device. + * @param uuid A UUID string identifying this Mobile Device. * @return RequestConfig */ - fun authenticatorsAdminSmsDestroyRequestConfig(id: kotlin.Int) : RequestConfig { + fun authenticatorsAdminMobileDestroyRequestConfig(uuid: java.util.UUID) : RequestConfig { val localVariableBody = null val localVariableQuery: MultiValueMap = mutableMapOf() val localVariableHeaders: MutableMap = mutableMapOf() @@ -739,7 +748,7 @@ class AuthenticatorsApi(basePath: kotlin.String = defaultBasePath, client: OkHtt return RequestConfig( method = RequestMethod.DELETE, - path = "/authenticators/admin/sms/{id}/".replace("{"+"id"+"}", encodeURIComponent(id.toString())), + path = "/authenticators/admin/mobile/{uuid}/".replace("{"+"uuid"+"}", encodeURIComponent(uuid.toString())), query = localVariableQuery, headers = localVariableHeaders, requiresAuthentication = true, @@ -749,13 +758,13 @@ class AuthenticatorsApi(basePath: kotlin.String = defaultBasePath, client: OkHtt /** * - * Viewset for sms authenticator devices (for admins) + * Viewset for Mobile authenticator devices (for admins) * @param name (optional) * @param ordering Which field to use when ordering the results. (optional) * @param page A page number within the paginated result set. (optional) * @param pageSize Number of results to return per page. (optional) * @param search A search term. (optional) - * @return PaginatedSMSDeviceList + * @return PaginatedMobileDeviceList * @throws IllegalStateException If the request is not correctly configured * @throws IOException Rethrows the OkHttp execute method exception * @throws UnsupportedOperationException If the API returns an informational or redirection response @@ -764,11 +773,11 @@ class AuthenticatorsApi(basePath: kotlin.String = defaultBasePath, client: OkHtt */ @Suppress("UNCHECKED_CAST") @Throws(IllegalStateException::class, IOException::class, UnsupportedOperationException::class, ClientException::class, ServerException::class) - fun authenticatorsAdminSmsList(name: kotlin.String? = null, ordering: kotlin.String? = null, page: kotlin.Int? = null, pageSize: kotlin.Int? = null, search: kotlin.String? = null) : PaginatedSMSDeviceList { - val localVarResponse = authenticatorsAdminSmsListWithHttpInfo(name = name, ordering = ordering, page = page, pageSize = pageSize, search = search) + fun authenticatorsAdminMobileList(name: kotlin.String? = null, ordering: kotlin.String? = null, page: kotlin.Int? = null, pageSize: kotlin.Int? = null, search: kotlin.String? = null) : PaginatedMobileDeviceList { + val localVarResponse = authenticatorsAdminMobileListWithHttpInfo(name = name, ordering = ordering, page = page, pageSize = pageSize, search = search) return when (localVarResponse.responseType) { - ResponseType.Success -> (localVarResponse as Success<*>).data as PaginatedSMSDeviceList + ResponseType.Success -> (localVarResponse as Success<*>).data as PaginatedMobileDeviceList ResponseType.Informational -> throw UnsupportedOperationException("Client does not support Informational responses.") ResponseType.Redirection -> throw UnsupportedOperationException("Client does not support Redirection responses.") ResponseType.ClientError -> { @@ -784,28 +793,28 @@ class AuthenticatorsApi(basePath: kotlin.String = defaultBasePath, client: OkHtt /** * - * Viewset for sms authenticator devices (for admins) + * Viewset for Mobile authenticator devices (for admins) * @param name (optional) * @param ordering Which field to use when ordering the results. (optional) * @param page A page number within the paginated result set. (optional) * @param pageSize Number of results to return per page. (optional) * @param search A search term. (optional) - * @return ApiResponse + * @return ApiResponse * @throws IllegalStateException If the request is not correctly configured * @throws IOException Rethrows the OkHttp execute method exception */ @Suppress("UNCHECKED_CAST") @Throws(IllegalStateException::class, IOException::class) - fun authenticatorsAdminSmsListWithHttpInfo(name: kotlin.String?, ordering: kotlin.String?, page: kotlin.Int?, pageSize: kotlin.Int?, search: kotlin.String?) : ApiResponse { - val localVariableConfig = authenticatorsAdminSmsListRequestConfig(name = name, ordering = ordering, page = page, pageSize = pageSize, search = search) + fun authenticatorsAdminMobileListWithHttpInfo(name: kotlin.String?, ordering: kotlin.String?, page: kotlin.Int?, pageSize: kotlin.Int?, search: kotlin.String?) : ApiResponse { + val localVariableConfig = authenticatorsAdminMobileListRequestConfig(name = name, ordering = ordering, page = page, pageSize = pageSize, search = search) - return request( + return request( localVariableConfig ) } /** - * To obtain the request config of the operation authenticatorsAdminSmsList + * To obtain the request config of the operation authenticatorsAdminMobileList * * @param name (optional) * @param ordering Which field to use when ordering the results. (optional) @@ -814,7 +823,7 @@ class AuthenticatorsApi(basePath: kotlin.String = defaultBasePath, client: OkHtt * @param search A search term. (optional) * @return RequestConfig */ - fun authenticatorsAdminSmsListRequestConfig(name: kotlin.String?, ordering: kotlin.String?, page: kotlin.Int?, pageSize: kotlin.Int?, search: kotlin.String?) : RequestConfig { + fun authenticatorsAdminMobileListRequestConfig(name: kotlin.String?, ordering: kotlin.String?, page: kotlin.Int?, pageSize: kotlin.Int?, search: kotlin.String?) : RequestConfig { val localVariableBody = null val localVariableQuery: MultiValueMap = mutableMapOf>() .apply { @@ -839,7 +848,7 @@ class AuthenticatorsApi(basePath: kotlin.String = defaultBasePath, client: OkHtt return RequestConfig( method = RequestMethod.GET, - path = "/authenticators/admin/sms/", + path = "/authenticators/admin/mobile/", query = localVariableQuery, headers = localVariableHeaders, requiresAuthentication = true, @@ -849,10 +858,10 @@ class AuthenticatorsApi(basePath: kotlin.String = defaultBasePath, client: OkHtt /** * - * Viewset for sms authenticator devices (for admins) - * @param id A unique integer value identifying this SMS Device. - * @param patchedSMSDeviceRequest (optional) - * @return SMSDevice + * Viewset for Mobile authenticator devices (for admins) + * @param uuid A UUID string identifying this Mobile Device. + * @param patchedMobileDeviceRequest (optional) + * @return MobileDevice * @throws IllegalStateException If the request is not correctly configured * @throws IOException Rethrows the OkHttp execute method exception * @throws UnsupportedOperationException If the API returns an informational or redirection response @@ -861,11 +870,11 @@ class AuthenticatorsApi(basePath: kotlin.String = defaultBasePath, client: OkHtt */ @Suppress("UNCHECKED_CAST") @Throws(IllegalStateException::class, IOException::class, UnsupportedOperationException::class, ClientException::class, ServerException::class) - fun authenticatorsAdminSmsPartialUpdate(id: kotlin.Int, patchedSMSDeviceRequest: PatchedSMSDeviceRequest? = null) : SMSDevice { - val localVarResponse = authenticatorsAdminSmsPartialUpdateWithHttpInfo(id = id, patchedSMSDeviceRequest = patchedSMSDeviceRequest) + fun authenticatorsAdminMobilePartialUpdate(uuid: java.util.UUID, patchedMobileDeviceRequest: PatchedMobileDeviceRequest? = null) : MobileDevice { + val localVarResponse = authenticatorsAdminMobilePartialUpdateWithHttpInfo(uuid = uuid, patchedMobileDeviceRequest = patchedMobileDeviceRequest) return when (localVarResponse.responseType) { - ResponseType.Success -> (localVarResponse as Success<*>).data as SMSDevice + ResponseType.Success -> (localVarResponse as Success<*>).data as MobileDevice ResponseType.Informational -> throw UnsupportedOperationException("Client does not support Informational responses.") ResponseType.Redirection -> throw UnsupportedOperationException("Client does not support Redirection responses.") ResponseType.ClientError -> { @@ -881,32 +890,32 @@ class AuthenticatorsApi(basePath: kotlin.String = defaultBasePath, client: OkHtt /** * - * Viewset for sms authenticator devices (for admins) - * @param id A unique integer value identifying this SMS Device. - * @param patchedSMSDeviceRequest (optional) - * @return ApiResponse + * Viewset for Mobile authenticator devices (for admins) + * @param uuid A UUID string identifying this Mobile Device. + * @param patchedMobileDeviceRequest (optional) + * @return ApiResponse * @throws IllegalStateException If the request is not correctly configured * @throws IOException Rethrows the OkHttp execute method exception */ @Suppress("UNCHECKED_CAST") @Throws(IllegalStateException::class, IOException::class) - fun authenticatorsAdminSmsPartialUpdateWithHttpInfo(id: kotlin.Int, patchedSMSDeviceRequest: PatchedSMSDeviceRequest?) : ApiResponse { - val localVariableConfig = authenticatorsAdminSmsPartialUpdateRequestConfig(id = id, patchedSMSDeviceRequest = patchedSMSDeviceRequest) + fun authenticatorsAdminMobilePartialUpdateWithHttpInfo(uuid: java.util.UUID, patchedMobileDeviceRequest: PatchedMobileDeviceRequest?) : ApiResponse { + val localVariableConfig = authenticatorsAdminMobilePartialUpdateRequestConfig(uuid = uuid, patchedMobileDeviceRequest = patchedMobileDeviceRequest) - return request( + return request( localVariableConfig ) } /** - * To obtain the request config of the operation authenticatorsAdminSmsPartialUpdate + * To obtain the request config of the operation authenticatorsAdminMobilePartialUpdate * - * @param id A unique integer value identifying this SMS Device. - * @param patchedSMSDeviceRequest (optional) + * @param uuid A UUID string identifying this Mobile Device. + * @param patchedMobileDeviceRequest (optional) * @return RequestConfig */ - fun authenticatorsAdminSmsPartialUpdateRequestConfig(id: kotlin.Int, patchedSMSDeviceRequest: PatchedSMSDeviceRequest?) : RequestConfig { - val localVariableBody = patchedSMSDeviceRequest + fun authenticatorsAdminMobilePartialUpdateRequestConfig(uuid: java.util.UUID, patchedMobileDeviceRequest: PatchedMobileDeviceRequest?) : RequestConfig { + val localVariableBody = patchedMobileDeviceRequest val localVariableQuery: MultiValueMap = mutableMapOf() val localVariableHeaders: MutableMap = mutableMapOf() localVariableHeaders["Content-Type"] = "application/json" @@ -914,7 +923,7 @@ class AuthenticatorsApi(basePath: kotlin.String = defaultBasePath, client: OkHtt return RequestConfig( method = RequestMethod.PATCH, - path = "/authenticators/admin/sms/{id}/".replace("{"+"id"+"}", encodeURIComponent(id.toString())), + path = "/authenticators/admin/mobile/{uuid}/".replace("{"+"uuid"+"}", encodeURIComponent(uuid.toString())), query = localVariableQuery, headers = localVariableHeaders, requiresAuthentication = true, @@ -924,9 +933,9 @@ class AuthenticatorsApi(basePath: kotlin.String = defaultBasePath, client: OkHtt /** * - * Viewset for sms authenticator devices (for admins) - * @param id A unique integer value identifying this SMS Device. - * @return SMSDevice + * Viewset for Mobile authenticator devices (for admins) + * @param uuid A UUID string identifying this Mobile Device. + * @return MobileDevice * @throws IllegalStateException If the request is not correctly configured * @throws IOException Rethrows the OkHttp execute method exception * @throws UnsupportedOperationException If the API returns an informational or redirection response @@ -935,11 +944,11 @@ class AuthenticatorsApi(basePath: kotlin.String = defaultBasePath, client: OkHtt */ @Suppress("UNCHECKED_CAST") @Throws(IllegalStateException::class, IOException::class, UnsupportedOperationException::class, ClientException::class, ServerException::class) - fun authenticatorsAdminSmsRetrieve(id: kotlin.Int) : SMSDevice { - val localVarResponse = authenticatorsAdminSmsRetrieveWithHttpInfo(id = id) + fun authenticatorsAdminMobileRetrieve(uuid: java.util.UUID) : MobileDevice { + val localVarResponse = authenticatorsAdminMobileRetrieveWithHttpInfo(uuid = uuid) return when (localVarResponse.responseType) { - ResponseType.Success -> (localVarResponse as Success<*>).data as SMSDevice + ResponseType.Success -> (localVarResponse as Success<*>).data as MobileDevice ResponseType.Informational -> throw UnsupportedOperationException("Client does not support Informational responses.") ResponseType.Redirection -> throw UnsupportedOperationException("Client does not support Redirection responses.") ResponseType.ClientError -> { @@ -955,29 +964,29 @@ class AuthenticatorsApi(basePath: kotlin.String = defaultBasePath, client: OkHtt /** * - * Viewset for sms authenticator devices (for admins) - * @param id A unique integer value identifying this SMS Device. - * @return ApiResponse + * Viewset for Mobile authenticator devices (for admins) + * @param uuid A UUID string identifying this Mobile Device. + * @return ApiResponse * @throws IllegalStateException If the request is not correctly configured * @throws IOException Rethrows the OkHttp execute method exception */ @Suppress("UNCHECKED_CAST") @Throws(IllegalStateException::class, IOException::class) - fun authenticatorsAdminSmsRetrieveWithHttpInfo(id: kotlin.Int) : ApiResponse { - val localVariableConfig = authenticatorsAdminSmsRetrieveRequestConfig(id = id) + fun authenticatorsAdminMobileRetrieveWithHttpInfo(uuid: java.util.UUID) : ApiResponse { + val localVariableConfig = authenticatorsAdminMobileRetrieveRequestConfig(uuid = uuid) - return request( + return request( localVariableConfig ) } /** - * To obtain the request config of the operation authenticatorsAdminSmsRetrieve + * To obtain the request config of the operation authenticatorsAdminMobileRetrieve * - * @param id A unique integer value identifying this SMS Device. + * @param uuid A UUID string identifying this Mobile Device. * @return RequestConfig */ - fun authenticatorsAdminSmsRetrieveRequestConfig(id: kotlin.Int) : RequestConfig { + fun authenticatorsAdminMobileRetrieveRequestConfig(uuid: java.util.UUID) : RequestConfig { val localVariableBody = null val localVariableQuery: MultiValueMap = mutableMapOf() val localVariableHeaders: MutableMap = mutableMapOf() @@ -985,7 +994,7 @@ class AuthenticatorsApi(basePath: kotlin.String = defaultBasePath, client: OkHtt return RequestConfig( method = RequestMethod.GET, - path = "/authenticators/admin/sms/{id}/".replace("{"+"id"+"}", encodeURIComponent(id.toString())), + path = "/authenticators/admin/mobile/{uuid}/".replace("{"+"uuid"+"}", encodeURIComponent(uuid.toString())), query = localVariableQuery, headers = localVariableHeaders, requiresAuthentication = true, @@ -995,10 +1004,10 @@ class AuthenticatorsApi(basePath: kotlin.String = defaultBasePath, client: OkHtt /** * - * Viewset for sms authenticator devices (for admins) - * @param id A unique integer value identifying this SMS Device. - * @param smSDeviceRequest - * @return SMSDevice + * Viewset for Mobile authenticator devices (for admins) + * @param uuid A UUID string identifying this Mobile Device. + * @param mobileDeviceRequest + * @return MobileDevice * @throws IllegalStateException If the request is not correctly configured * @throws IOException Rethrows the OkHttp execute method exception * @throws UnsupportedOperationException If the API returns an informational or redirection response @@ -1007,11 +1016,11 @@ class AuthenticatorsApi(basePath: kotlin.String = defaultBasePath, client: OkHtt */ @Suppress("UNCHECKED_CAST") @Throws(IllegalStateException::class, IOException::class, UnsupportedOperationException::class, ClientException::class, ServerException::class) - fun authenticatorsAdminSmsUpdate(id: kotlin.Int, smSDeviceRequest: SMSDeviceRequest) : SMSDevice { - val localVarResponse = authenticatorsAdminSmsUpdateWithHttpInfo(id = id, smSDeviceRequest = smSDeviceRequest) + fun authenticatorsAdminMobileUpdate(uuid: java.util.UUID, mobileDeviceRequest: MobileDeviceRequest) : MobileDevice { + val localVarResponse = authenticatorsAdminMobileUpdateWithHttpInfo(uuid = uuid, mobileDeviceRequest = mobileDeviceRequest) return when (localVarResponse.responseType) { - ResponseType.Success -> (localVarResponse as Success<*>).data as SMSDevice + ResponseType.Success -> (localVarResponse as Success<*>).data as MobileDevice ResponseType.Informational -> throw UnsupportedOperationException("Client does not support Informational responses.") ResponseType.Redirection -> throw UnsupportedOperationException("Client does not support Redirection responses.") ResponseType.ClientError -> { @@ -1027,32 +1036,32 @@ class AuthenticatorsApi(basePath: kotlin.String = defaultBasePath, client: OkHtt /** * - * Viewset for sms authenticator devices (for admins) - * @param id A unique integer value identifying this SMS Device. - * @param smSDeviceRequest - * @return ApiResponse + * Viewset for Mobile authenticator devices (for admins) + * @param uuid A UUID string identifying this Mobile Device. + * @param mobileDeviceRequest + * @return ApiResponse * @throws IllegalStateException If the request is not correctly configured * @throws IOException Rethrows the OkHttp execute method exception */ @Suppress("UNCHECKED_CAST") @Throws(IllegalStateException::class, IOException::class) - fun authenticatorsAdminSmsUpdateWithHttpInfo(id: kotlin.Int, smSDeviceRequest: SMSDeviceRequest) : ApiResponse { - val localVariableConfig = authenticatorsAdminSmsUpdateRequestConfig(id = id, smSDeviceRequest = smSDeviceRequest) + fun authenticatorsAdminMobileUpdateWithHttpInfo(uuid: java.util.UUID, mobileDeviceRequest: MobileDeviceRequest) : ApiResponse { + val localVariableConfig = authenticatorsAdminMobileUpdateRequestConfig(uuid = uuid, mobileDeviceRequest = mobileDeviceRequest) - return request( + return request( localVariableConfig ) } /** - * To obtain the request config of the operation authenticatorsAdminSmsUpdate + * To obtain the request config of the operation authenticatorsAdminMobileUpdate * - * @param id A unique integer value identifying this SMS Device. - * @param smSDeviceRequest + * @param uuid A UUID string identifying this Mobile Device. + * @param mobileDeviceRequest * @return RequestConfig */ - fun authenticatorsAdminSmsUpdateRequestConfig(id: kotlin.Int, smSDeviceRequest: SMSDeviceRequest) : RequestConfig { - val localVariableBody = smSDeviceRequest + fun authenticatorsAdminMobileUpdateRequestConfig(uuid: java.util.UUID, mobileDeviceRequest: MobileDeviceRequest) : RequestConfig { + val localVariableBody = mobileDeviceRequest val localVariableQuery: MultiValueMap = mutableMapOf() val localVariableHeaders: MutableMap = mutableMapOf() localVariableHeaders["Content-Type"] = "application/json" @@ -1060,7 +1069,7 @@ class AuthenticatorsApi(basePath: kotlin.String = defaultBasePath, client: OkHtt return RequestConfig( method = RequestMethod.PUT, - path = "/authenticators/admin/sms/{id}/".replace("{"+"id"+"}", encodeURIComponent(id.toString())), + path = "/authenticators/admin/mobile/{uuid}/".replace("{"+"uuid"+"}", encodeURIComponent(uuid.toString())), query = localVariableQuery, headers = localVariableHeaders, requiresAuthentication = true, @@ -1070,9 +1079,9 @@ class AuthenticatorsApi(basePath: kotlin.String = defaultBasePath, client: OkHtt /** * - * Viewset for static authenticator devices (for admins) - * @param staticDeviceRequest - * @return StaticDevice + * Viewset for sms authenticator devices (for admins) + * @param smSDeviceRequest + * @return SMSDevice * @throws IllegalStateException If the request is not correctly configured * @throws IOException Rethrows the OkHttp execute method exception * @throws UnsupportedOperationException If the API returns an informational or redirection response @@ -1081,11 +1090,11 @@ class AuthenticatorsApi(basePath: kotlin.String = defaultBasePath, client: OkHtt */ @Suppress("UNCHECKED_CAST") @Throws(IllegalStateException::class, IOException::class, UnsupportedOperationException::class, ClientException::class, ServerException::class) - fun authenticatorsAdminStaticCreate(staticDeviceRequest: StaticDeviceRequest) : StaticDevice { - val localVarResponse = authenticatorsAdminStaticCreateWithHttpInfo(staticDeviceRequest = staticDeviceRequest) + fun authenticatorsAdminSmsCreate(smSDeviceRequest: SMSDeviceRequest) : SMSDevice { + val localVarResponse = authenticatorsAdminSmsCreateWithHttpInfo(smSDeviceRequest = smSDeviceRequest) return when (localVarResponse.responseType) { - ResponseType.Success -> (localVarResponse as Success<*>).data as StaticDevice + ResponseType.Success -> (localVarResponse as Success<*>).data as SMSDevice ResponseType.Informational -> throw UnsupportedOperationException("Client does not support Informational responses.") ResponseType.Redirection -> throw UnsupportedOperationException("Client does not support Redirection responses.") ResponseType.ClientError -> { @@ -1101,30 +1110,30 @@ class AuthenticatorsApi(basePath: kotlin.String = defaultBasePath, client: OkHtt /** * - * Viewset for static authenticator devices (for admins) - * @param staticDeviceRequest - * @return ApiResponse + * Viewset for sms authenticator devices (for admins) + * @param smSDeviceRequest + * @return ApiResponse * @throws IllegalStateException If the request is not correctly configured * @throws IOException Rethrows the OkHttp execute method exception */ @Suppress("UNCHECKED_CAST") @Throws(IllegalStateException::class, IOException::class) - fun authenticatorsAdminStaticCreateWithHttpInfo(staticDeviceRequest: StaticDeviceRequest) : ApiResponse { - val localVariableConfig = authenticatorsAdminStaticCreateRequestConfig(staticDeviceRequest = staticDeviceRequest) + fun authenticatorsAdminSmsCreateWithHttpInfo(smSDeviceRequest: SMSDeviceRequest) : ApiResponse { + val localVariableConfig = authenticatorsAdminSmsCreateRequestConfig(smSDeviceRequest = smSDeviceRequest) - return request( + return request( localVariableConfig ) } /** - * To obtain the request config of the operation authenticatorsAdminStaticCreate + * To obtain the request config of the operation authenticatorsAdminSmsCreate * - * @param staticDeviceRequest + * @param smSDeviceRequest * @return RequestConfig */ - fun authenticatorsAdminStaticCreateRequestConfig(staticDeviceRequest: StaticDeviceRequest) : RequestConfig { - val localVariableBody = staticDeviceRequest + fun authenticatorsAdminSmsCreateRequestConfig(smSDeviceRequest: SMSDeviceRequest) : RequestConfig { + val localVariableBody = smSDeviceRequest val localVariableQuery: MultiValueMap = mutableMapOf() val localVariableHeaders: MutableMap = mutableMapOf() localVariableHeaders["Content-Type"] = "application/json" @@ -1132,7 +1141,7 @@ class AuthenticatorsApi(basePath: kotlin.String = defaultBasePath, client: OkHtt return RequestConfig( method = RequestMethod.POST, - path = "/authenticators/admin/static/", + path = "/authenticators/admin/sms/", query = localVariableQuery, headers = localVariableHeaders, requiresAuthentication = true, @@ -1142,8 +1151,8 @@ class AuthenticatorsApi(basePath: kotlin.String = defaultBasePath, client: OkHtt /** * - * Viewset for static authenticator devices (for admins) - * @param id A unique integer value identifying this Static Device. + * Viewset for sms authenticator devices (for admins) + * @param id A unique integer value identifying this SMS Device. * @return void * @throws IllegalStateException If the request is not correctly configured * @throws IOException Rethrows the OkHttp execute method exception @@ -1152,8 +1161,8 @@ class AuthenticatorsApi(basePath: kotlin.String = defaultBasePath, client: OkHtt * @throws ServerException If the API returns a server error response */ @Throws(IllegalStateException::class, IOException::class, UnsupportedOperationException::class, ClientException::class, ServerException::class) - fun authenticatorsAdminStaticDestroy(id: kotlin.Int) : Unit { - val localVarResponse = authenticatorsAdminStaticDestroyWithHttpInfo(id = id) + fun authenticatorsAdminSmsDestroy(id: kotlin.Int) : Unit { + val localVarResponse = authenticatorsAdminSmsDestroyWithHttpInfo(id = id) return when (localVarResponse.responseType) { ResponseType.Success -> Unit @@ -1172,15 +1181,15 @@ class AuthenticatorsApi(basePath: kotlin.String = defaultBasePath, client: OkHtt /** * - * Viewset for static authenticator devices (for admins) - * @param id A unique integer value identifying this Static Device. + * Viewset for sms authenticator devices (for admins) + * @param id A unique integer value identifying this SMS Device. * @return ApiResponse * @throws IllegalStateException If the request is not correctly configured * @throws IOException Rethrows the OkHttp execute method exception */ @Throws(IllegalStateException::class, IOException::class) - fun authenticatorsAdminStaticDestroyWithHttpInfo(id: kotlin.Int) : ApiResponse { - val localVariableConfig = authenticatorsAdminStaticDestroyRequestConfig(id = id) + fun authenticatorsAdminSmsDestroyWithHttpInfo(id: kotlin.Int) : ApiResponse { + val localVariableConfig = authenticatorsAdminSmsDestroyRequestConfig(id = id) return request( localVariableConfig @@ -1188,12 +1197,12 @@ class AuthenticatorsApi(basePath: kotlin.String = defaultBasePath, client: OkHtt } /** - * To obtain the request config of the operation authenticatorsAdminStaticDestroy + * To obtain the request config of the operation authenticatorsAdminSmsDestroy * - * @param id A unique integer value identifying this Static Device. + * @param id A unique integer value identifying this SMS Device. * @return RequestConfig */ - fun authenticatorsAdminStaticDestroyRequestConfig(id: kotlin.Int) : RequestConfig { + fun authenticatorsAdminSmsDestroyRequestConfig(id: kotlin.Int) : RequestConfig { val localVariableBody = null val localVariableQuery: MultiValueMap = mutableMapOf() val localVariableHeaders: MutableMap = mutableMapOf() @@ -1201,7 +1210,7 @@ class AuthenticatorsApi(basePath: kotlin.String = defaultBasePath, client: OkHtt return RequestConfig( method = RequestMethod.DELETE, - path = "/authenticators/admin/static/{id}/".replace("{"+"id"+"}", encodeURIComponent(id.toString())), + path = "/authenticators/admin/sms/{id}/".replace("{"+"id"+"}", encodeURIComponent(id.toString())), query = localVariableQuery, headers = localVariableHeaders, requiresAuthentication = true, @@ -1211,13 +1220,13 @@ class AuthenticatorsApi(basePath: kotlin.String = defaultBasePath, client: OkHtt /** * - * Viewset for static authenticator devices (for admins) + * Viewset for sms authenticator devices (for admins) * @param name (optional) * @param ordering Which field to use when ordering the results. (optional) * @param page A page number within the paginated result set. (optional) * @param pageSize Number of results to return per page. (optional) * @param search A search term. (optional) - * @return PaginatedStaticDeviceList + * @return PaginatedSMSDeviceList * @throws IllegalStateException If the request is not correctly configured * @throws IOException Rethrows the OkHttp execute method exception * @throws UnsupportedOperationException If the API returns an informational or redirection response @@ -1226,11 +1235,11 @@ class AuthenticatorsApi(basePath: kotlin.String = defaultBasePath, client: OkHtt */ @Suppress("UNCHECKED_CAST") @Throws(IllegalStateException::class, IOException::class, UnsupportedOperationException::class, ClientException::class, ServerException::class) - fun authenticatorsAdminStaticList(name: kotlin.String? = null, ordering: kotlin.String? = null, page: kotlin.Int? = null, pageSize: kotlin.Int? = null, search: kotlin.String? = null) : PaginatedStaticDeviceList { - val localVarResponse = authenticatorsAdminStaticListWithHttpInfo(name = name, ordering = ordering, page = page, pageSize = pageSize, search = search) + fun authenticatorsAdminSmsList(name: kotlin.String? = null, ordering: kotlin.String? = null, page: kotlin.Int? = null, pageSize: kotlin.Int? = null, search: kotlin.String? = null) : PaginatedSMSDeviceList { + val localVarResponse = authenticatorsAdminSmsListWithHttpInfo(name = name, ordering = ordering, page = page, pageSize = pageSize, search = search) return when (localVarResponse.responseType) { - ResponseType.Success -> (localVarResponse as Success<*>).data as PaginatedStaticDeviceList + ResponseType.Success -> (localVarResponse as Success<*>).data as PaginatedSMSDeviceList ResponseType.Informational -> throw UnsupportedOperationException("Client does not support Informational responses.") ResponseType.Redirection -> throw UnsupportedOperationException("Client does not support Redirection responses.") ResponseType.ClientError -> { @@ -1246,28 +1255,28 @@ class AuthenticatorsApi(basePath: kotlin.String = defaultBasePath, client: OkHtt /** * - * Viewset for static authenticator devices (for admins) + * Viewset for sms authenticator devices (for admins) * @param name (optional) * @param ordering Which field to use when ordering the results. (optional) * @param page A page number within the paginated result set. (optional) * @param pageSize Number of results to return per page. (optional) * @param search A search term. (optional) - * @return ApiResponse + * @return ApiResponse * @throws IllegalStateException If the request is not correctly configured * @throws IOException Rethrows the OkHttp execute method exception */ @Suppress("UNCHECKED_CAST") @Throws(IllegalStateException::class, IOException::class) - fun authenticatorsAdminStaticListWithHttpInfo(name: kotlin.String?, ordering: kotlin.String?, page: kotlin.Int?, pageSize: kotlin.Int?, search: kotlin.String?) : ApiResponse { - val localVariableConfig = authenticatorsAdminStaticListRequestConfig(name = name, ordering = ordering, page = page, pageSize = pageSize, search = search) + fun authenticatorsAdminSmsListWithHttpInfo(name: kotlin.String?, ordering: kotlin.String?, page: kotlin.Int?, pageSize: kotlin.Int?, search: kotlin.String?) : ApiResponse { + val localVariableConfig = authenticatorsAdminSmsListRequestConfig(name = name, ordering = ordering, page = page, pageSize = pageSize, search = search) - return request( + return request( localVariableConfig ) } /** - * To obtain the request config of the operation authenticatorsAdminStaticList + * To obtain the request config of the operation authenticatorsAdminSmsList * * @param name (optional) * @param ordering Which field to use when ordering the results. (optional) @@ -1276,7 +1285,7 @@ class AuthenticatorsApi(basePath: kotlin.String = defaultBasePath, client: OkHtt * @param search A search term. (optional) * @return RequestConfig */ - fun authenticatorsAdminStaticListRequestConfig(name: kotlin.String?, ordering: kotlin.String?, page: kotlin.Int?, pageSize: kotlin.Int?, search: kotlin.String?) : RequestConfig { + fun authenticatorsAdminSmsListRequestConfig(name: kotlin.String?, ordering: kotlin.String?, page: kotlin.Int?, pageSize: kotlin.Int?, search: kotlin.String?) : RequestConfig { val localVariableBody = null val localVariableQuery: MultiValueMap = mutableMapOf>() .apply { @@ -1301,7 +1310,7 @@ class AuthenticatorsApi(basePath: kotlin.String = defaultBasePath, client: OkHtt return RequestConfig( method = RequestMethod.GET, - path = "/authenticators/admin/static/", + path = "/authenticators/admin/sms/", query = localVariableQuery, headers = localVariableHeaders, requiresAuthentication = true, @@ -1311,10 +1320,10 @@ class AuthenticatorsApi(basePath: kotlin.String = defaultBasePath, client: OkHtt /** * - * Viewset for static authenticator devices (for admins) - * @param id A unique integer value identifying this Static Device. - * @param patchedStaticDeviceRequest (optional) - * @return StaticDevice + * Viewset for sms authenticator devices (for admins) + * @param id A unique integer value identifying this SMS Device. + * @param patchedSMSDeviceRequest (optional) + * @return SMSDevice * @throws IllegalStateException If the request is not correctly configured * @throws IOException Rethrows the OkHttp execute method exception * @throws UnsupportedOperationException If the API returns an informational or redirection response @@ -1323,11 +1332,11 @@ class AuthenticatorsApi(basePath: kotlin.String = defaultBasePath, client: OkHtt */ @Suppress("UNCHECKED_CAST") @Throws(IllegalStateException::class, IOException::class, UnsupportedOperationException::class, ClientException::class, ServerException::class) - fun authenticatorsAdminStaticPartialUpdate(id: kotlin.Int, patchedStaticDeviceRequest: PatchedStaticDeviceRequest? = null) : StaticDevice { - val localVarResponse = authenticatorsAdminStaticPartialUpdateWithHttpInfo(id = id, patchedStaticDeviceRequest = patchedStaticDeviceRequest) + fun authenticatorsAdminSmsPartialUpdate(id: kotlin.Int, patchedSMSDeviceRequest: PatchedSMSDeviceRequest? = null) : SMSDevice { + val localVarResponse = authenticatorsAdminSmsPartialUpdateWithHttpInfo(id = id, patchedSMSDeviceRequest = patchedSMSDeviceRequest) return when (localVarResponse.responseType) { - ResponseType.Success -> (localVarResponse as Success<*>).data as StaticDevice + ResponseType.Success -> (localVarResponse as Success<*>).data as SMSDevice ResponseType.Informational -> throw UnsupportedOperationException("Client does not support Informational responses.") ResponseType.Redirection -> throw UnsupportedOperationException("Client does not support Redirection responses.") ResponseType.ClientError -> { @@ -1343,32 +1352,32 @@ class AuthenticatorsApi(basePath: kotlin.String = defaultBasePath, client: OkHtt /** * - * Viewset for static authenticator devices (for admins) - * @param id A unique integer value identifying this Static Device. - * @param patchedStaticDeviceRequest (optional) - * @return ApiResponse + * Viewset for sms authenticator devices (for admins) + * @param id A unique integer value identifying this SMS Device. + * @param patchedSMSDeviceRequest (optional) + * @return ApiResponse * @throws IllegalStateException If the request is not correctly configured * @throws IOException Rethrows the OkHttp execute method exception */ @Suppress("UNCHECKED_CAST") @Throws(IllegalStateException::class, IOException::class) - fun authenticatorsAdminStaticPartialUpdateWithHttpInfo(id: kotlin.Int, patchedStaticDeviceRequest: PatchedStaticDeviceRequest?) : ApiResponse { - val localVariableConfig = authenticatorsAdminStaticPartialUpdateRequestConfig(id = id, patchedStaticDeviceRequest = patchedStaticDeviceRequest) + fun authenticatorsAdminSmsPartialUpdateWithHttpInfo(id: kotlin.Int, patchedSMSDeviceRequest: PatchedSMSDeviceRequest?) : ApiResponse { + val localVariableConfig = authenticatorsAdminSmsPartialUpdateRequestConfig(id = id, patchedSMSDeviceRequest = patchedSMSDeviceRequest) - return request( + return request( localVariableConfig ) } /** - * To obtain the request config of the operation authenticatorsAdminStaticPartialUpdate + * To obtain the request config of the operation authenticatorsAdminSmsPartialUpdate * - * @param id A unique integer value identifying this Static Device. - * @param patchedStaticDeviceRequest (optional) + * @param id A unique integer value identifying this SMS Device. + * @param patchedSMSDeviceRequest (optional) * @return RequestConfig */ - fun authenticatorsAdminStaticPartialUpdateRequestConfig(id: kotlin.Int, patchedStaticDeviceRequest: PatchedStaticDeviceRequest?) : RequestConfig { - val localVariableBody = patchedStaticDeviceRequest + fun authenticatorsAdminSmsPartialUpdateRequestConfig(id: kotlin.Int, patchedSMSDeviceRequest: PatchedSMSDeviceRequest?) : RequestConfig { + val localVariableBody = patchedSMSDeviceRequest val localVariableQuery: MultiValueMap = mutableMapOf() val localVariableHeaders: MutableMap = mutableMapOf() localVariableHeaders["Content-Type"] = "application/json" @@ -1376,7 +1385,7 @@ class AuthenticatorsApi(basePath: kotlin.String = defaultBasePath, client: OkHtt return RequestConfig( method = RequestMethod.PATCH, - path = "/authenticators/admin/static/{id}/".replace("{"+"id"+"}", encodeURIComponent(id.toString())), + path = "/authenticators/admin/sms/{id}/".replace("{"+"id"+"}", encodeURIComponent(id.toString())), query = localVariableQuery, headers = localVariableHeaders, requiresAuthentication = true, @@ -1386,9 +1395,9 @@ class AuthenticatorsApi(basePath: kotlin.String = defaultBasePath, client: OkHtt /** * - * Viewset for static authenticator devices (for admins) - * @param id A unique integer value identifying this Static Device. - * @return StaticDevice + * Viewset for sms authenticator devices (for admins) + * @param id A unique integer value identifying this SMS Device. + * @return SMSDevice * @throws IllegalStateException If the request is not correctly configured * @throws IOException Rethrows the OkHttp execute method exception * @throws UnsupportedOperationException If the API returns an informational or redirection response @@ -1397,11 +1406,11 @@ class AuthenticatorsApi(basePath: kotlin.String = defaultBasePath, client: OkHtt */ @Suppress("UNCHECKED_CAST") @Throws(IllegalStateException::class, IOException::class, UnsupportedOperationException::class, ClientException::class, ServerException::class) - fun authenticatorsAdminStaticRetrieve(id: kotlin.Int) : StaticDevice { - val localVarResponse = authenticatorsAdminStaticRetrieveWithHttpInfo(id = id) + fun authenticatorsAdminSmsRetrieve(id: kotlin.Int) : SMSDevice { + val localVarResponse = authenticatorsAdminSmsRetrieveWithHttpInfo(id = id) return when (localVarResponse.responseType) { - ResponseType.Success -> (localVarResponse as Success<*>).data as StaticDevice + ResponseType.Success -> (localVarResponse as Success<*>).data as SMSDevice ResponseType.Informational -> throw UnsupportedOperationException("Client does not support Informational responses.") ResponseType.Redirection -> throw UnsupportedOperationException("Client does not support Redirection responses.") ResponseType.ClientError -> { @@ -1417,29 +1426,29 @@ class AuthenticatorsApi(basePath: kotlin.String = defaultBasePath, client: OkHtt /** * - * Viewset for static authenticator devices (for admins) - * @param id A unique integer value identifying this Static Device. - * @return ApiResponse + * Viewset for sms authenticator devices (for admins) + * @param id A unique integer value identifying this SMS Device. + * @return ApiResponse * @throws IllegalStateException If the request is not correctly configured * @throws IOException Rethrows the OkHttp execute method exception */ @Suppress("UNCHECKED_CAST") @Throws(IllegalStateException::class, IOException::class) - fun authenticatorsAdminStaticRetrieveWithHttpInfo(id: kotlin.Int) : ApiResponse { - val localVariableConfig = authenticatorsAdminStaticRetrieveRequestConfig(id = id) + fun authenticatorsAdminSmsRetrieveWithHttpInfo(id: kotlin.Int) : ApiResponse { + val localVariableConfig = authenticatorsAdminSmsRetrieveRequestConfig(id = id) - return request( + return request( localVariableConfig ) } /** - * To obtain the request config of the operation authenticatorsAdminStaticRetrieve + * To obtain the request config of the operation authenticatorsAdminSmsRetrieve * - * @param id A unique integer value identifying this Static Device. + * @param id A unique integer value identifying this SMS Device. * @return RequestConfig */ - fun authenticatorsAdminStaticRetrieveRequestConfig(id: kotlin.Int) : RequestConfig { + fun authenticatorsAdminSmsRetrieveRequestConfig(id: kotlin.Int) : RequestConfig { val localVariableBody = null val localVariableQuery: MultiValueMap = mutableMapOf() val localVariableHeaders: MutableMap = mutableMapOf() @@ -1447,7 +1456,7 @@ class AuthenticatorsApi(basePath: kotlin.String = defaultBasePath, client: OkHtt return RequestConfig( method = RequestMethod.GET, - path = "/authenticators/admin/static/{id}/".replace("{"+"id"+"}", encodeURIComponent(id.toString())), + path = "/authenticators/admin/sms/{id}/".replace("{"+"id"+"}", encodeURIComponent(id.toString())), query = localVariableQuery, headers = localVariableHeaders, requiresAuthentication = true, @@ -1457,10 +1466,10 @@ class AuthenticatorsApi(basePath: kotlin.String = defaultBasePath, client: OkHtt /** * - * Viewset for static authenticator devices (for admins) - * @param id A unique integer value identifying this Static Device. - * @param staticDeviceRequest - * @return StaticDevice + * Viewset for sms authenticator devices (for admins) + * @param id A unique integer value identifying this SMS Device. + * @param smSDeviceRequest + * @return SMSDevice * @throws IllegalStateException If the request is not correctly configured * @throws IOException Rethrows the OkHttp execute method exception * @throws UnsupportedOperationException If the API returns an informational or redirection response @@ -1469,11 +1478,11 @@ class AuthenticatorsApi(basePath: kotlin.String = defaultBasePath, client: OkHtt */ @Suppress("UNCHECKED_CAST") @Throws(IllegalStateException::class, IOException::class, UnsupportedOperationException::class, ClientException::class, ServerException::class) - fun authenticatorsAdminStaticUpdate(id: kotlin.Int, staticDeviceRequest: StaticDeviceRequest) : StaticDevice { - val localVarResponse = authenticatorsAdminStaticUpdateWithHttpInfo(id = id, staticDeviceRequest = staticDeviceRequest) + fun authenticatorsAdminSmsUpdate(id: kotlin.Int, smSDeviceRequest: SMSDeviceRequest) : SMSDevice { + val localVarResponse = authenticatorsAdminSmsUpdateWithHttpInfo(id = id, smSDeviceRequest = smSDeviceRequest) return when (localVarResponse.responseType) { - ResponseType.Success -> (localVarResponse as Success<*>).data as StaticDevice + ResponseType.Success -> (localVarResponse as Success<*>).data as SMSDevice ResponseType.Informational -> throw UnsupportedOperationException("Client does not support Informational responses.") ResponseType.Redirection -> throw UnsupportedOperationException("Client does not support Redirection responses.") ResponseType.ClientError -> { @@ -1489,32 +1498,32 @@ class AuthenticatorsApi(basePath: kotlin.String = defaultBasePath, client: OkHtt /** * - * Viewset for static authenticator devices (for admins) - * @param id A unique integer value identifying this Static Device. - * @param staticDeviceRequest - * @return ApiResponse + * Viewset for sms authenticator devices (for admins) + * @param id A unique integer value identifying this SMS Device. + * @param smSDeviceRequest + * @return ApiResponse * @throws IllegalStateException If the request is not correctly configured * @throws IOException Rethrows the OkHttp execute method exception */ @Suppress("UNCHECKED_CAST") @Throws(IllegalStateException::class, IOException::class) - fun authenticatorsAdminStaticUpdateWithHttpInfo(id: kotlin.Int, staticDeviceRequest: StaticDeviceRequest) : ApiResponse { - val localVariableConfig = authenticatorsAdminStaticUpdateRequestConfig(id = id, staticDeviceRequest = staticDeviceRequest) + fun authenticatorsAdminSmsUpdateWithHttpInfo(id: kotlin.Int, smSDeviceRequest: SMSDeviceRequest) : ApiResponse { + val localVariableConfig = authenticatorsAdminSmsUpdateRequestConfig(id = id, smSDeviceRequest = smSDeviceRequest) - return request( + return request( localVariableConfig ) } /** - * To obtain the request config of the operation authenticatorsAdminStaticUpdate + * To obtain the request config of the operation authenticatorsAdminSmsUpdate * - * @param id A unique integer value identifying this Static Device. - * @param staticDeviceRequest + * @param id A unique integer value identifying this SMS Device. + * @param smSDeviceRequest * @return RequestConfig */ - fun authenticatorsAdminStaticUpdateRequestConfig(id: kotlin.Int, staticDeviceRequest: StaticDeviceRequest) : RequestConfig { - val localVariableBody = staticDeviceRequest + fun authenticatorsAdminSmsUpdateRequestConfig(id: kotlin.Int, smSDeviceRequest: SMSDeviceRequest) : RequestConfig { + val localVariableBody = smSDeviceRequest val localVariableQuery: MultiValueMap = mutableMapOf() val localVariableHeaders: MutableMap = mutableMapOf() localVariableHeaders["Content-Type"] = "application/json" @@ -1522,7 +1531,7 @@ class AuthenticatorsApi(basePath: kotlin.String = defaultBasePath, client: OkHtt return RequestConfig( method = RequestMethod.PUT, - path = "/authenticators/admin/static/{id}/".replace("{"+"id"+"}", encodeURIComponent(id.toString())), + path = "/authenticators/admin/sms/{id}/".replace("{"+"id"+"}", encodeURIComponent(id.toString())), query = localVariableQuery, headers = localVariableHeaders, requiresAuthentication = true, @@ -1532,9 +1541,9 @@ class AuthenticatorsApi(basePath: kotlin.String = defaultBasePath, client: OkHtt /** * - * Viewset for totp authenticator devices (for admins) - * @param toTPDeviceRequest - * @return TOTPDevice + * Viewset for static authenticator devices (for admins) + * @param staticDeviceRequest + * @return StaticDevice * @throws IllegalStateException If the request is not correctly configured * @throws IOException Rethrows the OkHttp execute method exception * @throws UnsupportedOperationException If the API returns an informational or redirection response @@ -1543,11 +1552,11 @@ class AuthenticatorsApi(basePath: kotlin.String = defaultBasePath, client: OkHtt */ @Suppress("UNCHECKED_CAST") @Throws(IllegalStateException::class, IOException::class, UnsupportedOperationException::class, ClientException::class, ServerException::class) - fun authenticatorsAdminTotpCreate(toTPDeviceRequest: TOTPDeviceRequest) : TOTPDevice { - val localVarResponse = authenticatorsAdminTotpCreateWithHttpInfo(toTPDeviceRequest = toTPDeviceRequest) + fun authenticatorsAdminStaticCreate(staticDeviceRequest: StaticDeviceRequest) : StaticDevice { + val localVarResponse = authenticatorsAdminStaticCreateWithHttpInfo(staticDeviceRequest = staticDeviceRequest) return when (localVarResponse.responseType) { - ResponseType.Success -> (localVarResponse as Success<*>).data as TOTPDevice + ResponseType.Success -> (localVarResponse as Success<*>).data as StaticDevice ResponseType.Informational -> throw UnsupportedOperationException("Client does not support Informational responses.") ResponseType.Redirection -> throw UnsupportedOperationException("Client does not support Redirection responses.") ResponseType.ClientError -> { @@ -1563,30 +1572,30 @@ class AuthenticatorsApi(basePath: kotlin.String = defaultBasePath, client: OkHtt /** * - * Viewset for totp authenticator devices (for admins) - * @param toTPDeviceRequest - * @return ApiResponse + * Viewset for static authenticator devices (for admins) + * @param staticDeviceRequest + * @return ApiResponse * @throws IllegalStateException If the request is not correctly configured * @throws IOException Rethrows the OkHttp execute method exception */ @Suppress("UNCHECKED_CAST") @Throws(IllegalStateException::class, IOException::class) - fun authenticatorsAdminTotpCreateWithHttpInfo(toTPDeviceRequest: TOTPDeviceRequest) : ApiResponse { - val localVariableConfig = authenticatorsAdminTotpCreateRequestConfig(toTPDeviceRequest = toTPDeviceRequest) + fun authenticatorsAdminStaticCreateWithHttpInfo(staticDeviceRequest: StaticDeviceRequest) : ApiResponse { + val localVariableConfig = authenticatorsAdminStaticCreateRequestConfig(staticDeviceRequest = staticDeviceRequest) - return request( + return request( localVariableConfig ) } /** - * To obtain the request config of the operation authenticatorsAdminTotpCreate + * To obtain the request config of the operation authenticatorsAdminStaticCreate * - * @param toTPDeviceRequest + * @param staticDeviceRequest * @return RequestConfig */ - fun authenticatorsAdminTotpCreateRequestConfig(toTPDeviceRequest: TOTPDeviceRequest) : RequestConfig { - val localVariableBody = toTPDeviceRequest + fun authenticatorsAdminStaticCreateRequestConfig(staticDeviceRequest: StaticDeviceRequest) : RequestConfig { + val localVariableBody = staticDeviceRequest val localVariableQuery: MultiValueMap = mutableMapOf() val localVariableHeaders: MutableMap = mutableMapOf() localVariableHeaders["Content-Type"] = "application/json" @@ -1594,7 +1603,7 @@ class AuthenticatorsApi(basePath: kotlin.String = defaultBasePath, client: OkHtt return RequestConfig( method = RequestMethod.POST, - path = "/authenticators/admin/totp/", + path = "/authenticators/admin/static/", query = localVariableQuery, headers = localVariableHeaders, requiresAuthentication = true, @@ -1604,8 +1613,8 @@ class AuthenticatorsApi(basePath: kotlin.String = defaultBasePath, client: OkHtt /** * - * Viewset for totp authenticator devices (for admins) - * @param id A unique integer value identifying this TOTP Device. + * Viewset for static authenticator devices (for admins) + * @param id A unique integer value identifying this Static Device. * @return void * @throws IllegalStateException If the request is not correctly configured * @throws IOException Rethrows the OkHttp execute method exception @@ -1614,8 +1623,8 @@ class AuthenticatorsApi(basePath: kotlin.String = defaultBasePath, client: OkHtt * @throws ServerException If the API returns a server error response */ @Throws(IllegalStateException::class, IOException::class, UnsupportedOperationException::class, ClientException::class, ServerException::class) - fun authenticatorsAdminTotpDestroy(id: kotlin.Int) : Unit { - val localVarResponse = authenticatorsAdminTotpDestroyWithHttpInfo(id = id) + fun authenticatorsAdminStaticDestroy(id: kotlin.Int) : Unit { + val localVarResponse = authenticatorsAdminStaticDestroyWithHttpInfo(id = id) return when (localVarResponse.responseType) { ResponseType.Success -> Unit @@ -1634,15 +1643,15 @@ class AuthenticatorsApi(basePath: kotlin.String = defaultBasePath, client: OkHtt /** * - * Viewset for totp authenticator devices (for admins) - * @param id A unique integer value identifying this TOTP Device. + * Viewset for static authenticator devices (for admins) + * @param id A unique integer value identifying this Static Device. * @return ApiResponse * @throws IllegalStateException If the request is not correctly configured * @throws IOException Rethrows the OkHttp execute method exception */ @Throws(IllegalStateException::class, IOException::class) - fun authenticatorsAdminTotpDestroyWithHttpInfo(id: kotlin.Int) : ApiResponse { - val localVariableConfig = authenticatorsAdminTotpDestroyRequestConfig(id = id) + fun authenticatorsAdminStaticDestroyWithHttpInfo(id: kotlin.Int) : ApiResponse { + val localVariableConfig = authenticatorsAdminStaticDestroyRequestConfig(id = id) return request( localVariableConfig @@ -1650,12 +1659,12 @@ class AuthenticatorsApi(basePath: kotlin.String = defaultBasePath, client: OkHtt } /** - * To obtain the request config of the operation authenticatorsAdminTotpDestroy + * To obtain the request config of the operation authenticatorsAdminStaticDestroy * - * @param id A unique integer value identifying this TOTP Device. + * @param id A unique integer value identifying this Static Device. * @return RequestConfig */ - fun authenticatorsAdminTotpDestroyRequestConfig(id: kotlin.Int) : RequestConfig { + fun authenticatorsAdminStaticDestroyRequestConfig(id: kotlin.Int) : RequestConfig { val localVariableBody = null val localVariableQuery: MultiValueMap = mutableMapOf() val localVariableHeaders: MutableMap = mutableMapOf() @@ -1663,7 +1672,7 @@ class AuthenticatorsApi(basePath: kotlin.String = defaultBasePath, client: OkHtt return RequestConfig( method = RequestMethod.DELETE, - path = "/authenticators/admin/totp/{id}/".replace("{"+"id"+"}", encodeURIComponent(id.toString())), + path = "/authenticators/admin/static/{id}/".replace("{"+"id"+"}", encodeURIComponent(id.toString())), query = localVariableQuery, headers = localVariableHeaders, requiresAuthentication = true, @@ -1673,13 +1682,13 @@ class AuthenticatorsApi(basePath: kotlin.String = defaultBasePath, client: OkHtt /** * - * Viewset for totp authenticator devices (for admins) + * Viewset for static authenticator devices (for admins) * @param name (optional) * @param ordering Which field to use when ordering the results. (optional) * @param page A page number within the paginated result set. (optional) * @param pageSize Number of results to return per page. (optional) * @param search A search term. (optional) - * @return PaginatedTOTPDeviceList + * @return PaginatedStaticDeviceList * @throws IllegalStateException If the request is not correctly configured * @throws IOException Rethrows the OkHttp execute method exception * @throws UnsupportedOperationException If the API returns an informational or redirection response @@ -1688,11 +1697,11 @@ class AuthenticatorsApi(basePath: kotlin.String = defaultBasePath, client: OkHtt */ @Suppress("UNCHECKED_CAST") @Throws(IllegalStateException::class, IOException::class, UnsupportedOperationException::class, ClientException::class, ServerException::class) - fun authenticatorsAdminTotpList(name: kotlin.String? = null, ordering: kotlin.String? = null, page: kotlin.Int? = null, pageSize: kotlin.Int? = null, search: kotlin.String? = null) : PaginatedTOTPDeviceList { - val localVarResponse = authenticatorsAdminTotpListWithHttpInfo(name = name, ordering = ordering, page = page, pageSize = pageSize, search = search) + fun authenticatorsAdminStaticList(name: kotlin.String? = null, ordering: kotlin.String? = null, page: kotlin.Int? = null, pageSize: kotlin.Int? = null, search: kotlin.String? = null) : PaginatedStaticDeviceList { + val localVarResponse = authenticatorsAdminStaticListWithHttpInfo(name = name, ordering = ordering, page = page, pageSize = pageSize, search = search) return when (localVarResponse.responseType) { - ResponseType.Success -> (localVarResponse as Success<*>).data as PaginatedTOTPDeviceList + ResponseType.Success -> (localVarResponse as Success<*>).data as PaginatedStaticDeviceList ResponseType.Informational -> throw UnsupportedOperationException("Client does not support Informational responses.") ResponseType.Redirection -> throw UnsupportedOperationException("Client does not support Redirection responses.") ResponseType.ClientError -> { @@ -1708,28 +1717,28 @@ class AuthenticatorsApi(basePath: kotlin.String = defaultBasePath, client: OkHtt /** * - * Viewset for totp authenticator devices (for admins) + * Viewset for static authenticator devices (for admins) * @param name (optional) * @param ordering Which field to use when ordering the results. (optional) * @param page A page number within the paginated result set. (optional) * @param pageSize Number of results to return per page. (optional) * @param search A search term. (optional) - * @return ApiResponse + * @return ApiResponse * @throws IllegalStateException If the request is not correctly configured * @throws IOException Rethrows the OkHttp execute method exception */ @Suppress("UNCHECKED_CAST") @Throws(IllegalStateException::class, IOException::class) - fun authenticatorsAdminTotpListWithHttpInfo(name: kotlin.String?, ordering: kotlin.String?, page: kotlin.Int?, pageSize: kotlin.Int?, search: kotlin.String?) : ApiResponse { - val localVariableConfig = authenticatorsAdminTotpListRequestConfig(name = name, ordering = ordering, page = page, pageSize = pageSize, search = search) + fun authenticatorsAdminStaticListWithHttpInfo(name: kotlin.String?, ordering: kotlin.String?, page: kotlin.Int?, pageSize: kotlin.Int?, search: kotlin.String?) : ApiResponse { + val localVariableConfig = authenticatorsAdminStaticListRequestConfig(name = name, ordering = ordering, page = page, pageSize = pageSize, search = search) - return request( + return request( localVariableConfig ) } /** - * To obtain the request config of the operation authenticatorsAdminTotpList + * To obtain the request config of the operation authenticatorsAdminStaticList * * @param name (optional) * @param ordering Which field to use when ordering the results. (optional) @@ -1738,7 +1747,7 @@ class AuthenticatorsApi(basePath: kotlin.String = defaultBasePath, client: OkHtt * @param search A search term. (optional) * @return RequestConfig */ - fun authenticatorsAdminTotpListRequestConfig(name: kotlin.String?, ordering: kotlin.String?, page: kotlin.Int?, pageSize: kotlin.Int?, search: kotlin.String?) : RequestConfig { + fun authenticatorsAdminStaticListRequestConfig(name: kotlin.String?, ordering: kotlin.String?, page: kotlin.Int?, pageSize: kotlin.Int?, search: kotlin.String?) : RequestConfig { val localVariableBody = null val localVariableQuery: MultiValueMap = mutableMapOf>() .apply { @@ -1763,7 +1772,7 @@ class AuthenticatorsApi(basePath: kotlin.String = defaultBasePath, client: OkHtt return RequestConfig( method = RequestMethod.GET, - path = "/authenticators/admin/totp/", + path = "/authenticators/admin/static/", query = localVariableQuery, headers = localVariableHeaders, requiresAuthentication = true, @@ -1773,10 +1782,10 @@ class AuthenticatorsApi(basePath: kotlin.String = defaultBasePath, client: OkHtt /** * - * Viewset for totp authenticator devices (for admins) - * @param id A unique integer value identifying this TOTP Device. - * @param patchedTOTPDeviceRequest (optional) - * @return TOTPDevice + * Viewset for static authenticator devices (for admins) + * @param id A unique integer value identifying this Static Device. + * @param patchedStaticDeviceRequest (optional) + * @return StaticDevice * @throws IllegalStateException If the request is not correctly configured * @throws IOException Rethrows the OkHttp execute method exception * @throws UnsupportedOperationException If the API returns an informational or redirection response @@ -1785,11 +1794,11 @@ class AuthenticatorsApi(basePath: kotlin.String = defaultBasePath, client: OkHtt */ @Suppress("UNCHECKED_CAST") @Throws(IllegalStateException::class, IOException::class, UnsupportedOperationException::class, ClientException::class, ServerException::class) - fun authenticatorsAdminTotpPartialUpdate(id: kotlin.Int, patchedTOTPDeviceRequest: PatchedTOTPDeviceRequest? = null) : TOTPDevice { - val localVarResponse = authenticatorsAdminTotpPartialUpdateWithHttpInfo(id = id, patchedTOTPDeviceRequest = patchedTOTPDeviceRequest) + fun authenticatorsAdminStaticPartialUpdate(id: kotlin.Int, patchedStaticDeviceRequest: PatchedStaticDeviceRequest? = null) : StaticDevice { + val localVarResponse = authenticatorsAdminStaticPartialUpdateWithHttpInfo(id = id, patchedStaticDeviceRequest = patchedStaticDeviceRequest) return when (localVarResponse.responseType) { - ResponseType.Success -> (localVarResponse as Success<*>).data as TOTPDevice + ResponseType.Success -> (localVarResponse as Success<*>).data as StaticDevice ResponseType.Informational -> throw UnsupportedOperationException("Client does not support Informational responses.") ResponseType.Redirection -> throw UnsupportedOperationException("Client does not support Redirection responses.") ResponseType.ClientError -> { @@ -1805,32 +1814,32 @@ class AuthenticatorsApi(basePath: kotlin.String = defaultBasePath, client: OkHtt /** * - * Viewset for totp authenticator devices (for admins) - * @param id A unique integer value identifying this TOTP Device. - * @param patchedTOTPDeviceRequest (optional) - * @return ApiResponse + * Viewset for static authenticator devices (for admins) + * @param id A unique integer value identifying this Static Device. + * @param patchedStaticDeviceRequest (optional) + * @return ApiResponse * @throws IllegalStateException If the request is not correctly configured * @throws IOException Rethrows the OkHttp execute method exception */ @Suppress("UNCHECKED_CAST") @Throws(IllegalStateException::class, IOException::class) - fun authenticatorsAdminTotpPartialUpdateWithHttpInfo(id: kotlin.Int, patchedTOTPDeviceRequest: PatchedTOTPDeviceRequest?) : ApiResponse { - val localVariableConfig = authenticatorsAdminTotpPartialUpdateRequestConfig(id = id, patchedTOTPDeviceRequest = patchedTOTPDeviceRequest) + fun authenticatorsAdminStaticPartialUpdateWithHttpInfo(id: kotlin.Int, patchedStaticDeviceRequest: PatchedStaticDeviceRequest?) : ApiResponse { + val localVariableConfig = authenticatorsAdminStaticPartialUpdateRequestConfig(id = id, patchedStaticDeviceRequest = patchedStaticDeviceRequest) - return request( + return request( localVariableConfig ) } /** - * To obtain the request config of the operation authenticatorsAdminTotpPartialUpdate + * To obtain the request config of the operation authenticatorsAdminStaticPartialUpdate * - * @param id A unique integer value identifying this TOTP Device. - * @param patchedTOTPDeviceRequest (optional) + * @param id A unique integer value identifying this Static Device. + * @param patchedStaticDeviceRequest (optional) * @return RequestConfig */ - fun authenticatorsAdminTotpPartialUpdateRequestConfig(id: kotlin.Int, patchedTOTPDeviceRequest: PatchedTOTPDeviceRequest?) : RequestConfig { - val localVariableBody = patchedTOTPDeviceRequest + fun authenticatorsAdminStaticPartialUpdateRequestConfig(id: kotlin.Int, patchedStaticDeviceRequest: PatchedStaticDeviceRequest?) : RequestConfig { + val localVariableBody = patchedStaticDeviceRequest val localVariableQuery: MultiValueMap = mutableMapOf() val localVariableHeaders: MutableMap = mutableMapOf() localVariableHeaders["Content-Type"] = "application/json" @@ -1838,7 +1847,7 @@ class AuthenticatorsApi(basePath: kotlin.String = defaultBasePath, client: OkHtt return RequestConfig( method = RequestMethod.PATCH, - path = "/authenticators/admin/totp/{id}/".replace("{"+"id"+"}", encodeURIComponent(id.toString())), + path = "/authenticators/admin/static/{id}/".replace("{"+"id"+"}", encodeURIComponent(id.toString())), query = localVariableQuery, headers = localVariableHeaders, requiresAuthentication = true, @@ -1848,9 +1857,9 @@ class AuthenticatorsApi(basePath: kotlin.String = defaultBasePath, client: OkHtt /** * - * Viewset for totp authenticator devices (for admins) - * @param id A unique integer value identifying this TOTP Device. - * @return TOTPDevice + * Viewset for static authenticator devices (for admins) + * @param id A unique integer value identifying this Static Device. + * @return StaticDevice * @throws IllegalStateException If the request is not correctly configured * @throws IOException Rethrows the OkHttp execute method exception * @throws UnsupportedOperationException If the API returns an informational or redirection response @@ -1859,11 +1868,11 @@ class AuthenticatorsApi(basePath: kotlin.String = defaultBasePath, client: OkHtt */ @Suppress("UNCHECKED_CAST") @Throws(IllegalStateException::class, IOException::class, UnsupportedOperationException::class, ClientException::class, ServerException::class) - fun authenticatorsAdminTotpRetrieve(id: kotlin.Int) : TOTPDevice { - val localVarResponse = authenticatorsAdminTotpRetrieveWithHttpInfo(id = id) + fun authenticatorsAdminStaticRetrieve(id: kotlin.Int) : StaticDevice { + val localVarResponse = authenticatorsAdminStaticRetrieveWithHttpInfo(id = id) return when (localVarResponse.responseType) { - ResponseType.Success -> (localVarResponse as Success<*>).data as TOTPDevice + ResponseType.Success -> (localVarResponse as Success<*>).data as StaticDevice ResponseType.Informational -> throw UnsupportedOperationException("Client does not support Informational responses.") ResponseType.Redirection -> throw UnsupportedOperationException("Client does not support Redirection responses.") ResponseType.ClientError -> { @@ -1879,29 +1888,29 @@ class AuthenticatorsApi(basePath: kotlin.String = defaultBasePath, client: OkHtt /** * - * Viewset for totp authenticator devices (for admins) - * @param id A unique integer value identifying this TOTP Device. - * @return ApiResponse + * Viewset for static authenticator devices (for admins) + * @param id A unique integer value identifying this Static Device. + * @return ApiResponse * @throws IllegalStateException If the request is not correctly configured * @throws IOException Rethrows the OkHttp execute method exception */ @Suppress("UNCHECKED_CAST") @Throws(IllegalStateException::class, IOException::class) - fun authenticatorsAdminTotpRetrieveWithHttpInfo(id: kotlin.Int) : ApiResponse { - val localVariableConfig = authenticatorsAdminTotpRetrieveRequestConfig(id = id) + fun authenticatorsAdminStaticRetrieveWithHttpInfo(id: kotlin.Int) : ApiResponse { + val localVariableConfig = authenticatorsAdminStaticRetrieveRequestConfig(id = id) - return request( + return request( localVariableConfig ) } /** - * To obtain the request config of the operation authenticatorsAdminTotpRetrieve + * To obtain the request config of the operation authenticatorsAdminStaticRetrieve * - * @param id A unique integer value identifying this TOTP Device. + * @param id A unique integer value identifying this Static Device. * @return RequestConfig */ - fun authenticatorsAdminTotpRetrieveRequestConfig(id: kotlin.Int) : RequestConfig { + fun authenticatorsAdminStaticRetrieveRequestConfig(id: kotlin.Int) : RequestConfig { val localVariableBody = null val localVariableQuery: MultiValueMap = mutableMapOf() val localVariableHeaders: MutableMap = mutableMapOf() @@ -1909,7 +1918,7 @@ class AuthenticatorsApi(basePath: kotlin.String = defaultBasePath, client: OkHtt return RequestConfig( method = RequestMethod.GET, - path = "/authenticators/admin/totp/{id}/".replace("{"+"id"+"}", encodeURIComponent(id.toString())), + path = "/authenticators/admin/static/{id}/".replace("{"+"id"+"}", encodeURIComponent(id.toString())), query = localVariableQuery, headers = localVariableHeaders, requiresAuthentication = true, @@ -1919,10 +1928,10 @@ class AuthenticatorsApi(basePath: kotlin.String = defaultBasePath, client: OkHtt /** * - * Viewset for totp authenticator devices (for admins) - * @param id A unique integer value identifying this TOTP Device. - * @param toTPDeviceRequest - * @return TOTPDevice + * Viewset for static authenticator devices (for admins) + * @param id A unique integer value identifying this Static Device. + * @param staticDeviceRequest + * @return StaticDevice * @throws IllegalStateException If the request is not correctly configured * @throws IOException Rethrows the OkHttp execute method exception * @throws UnsupportedOperationException If the API returns an informational or redirection response @@ -1931,11 +1940,11 @@ class AuthenticatorsApi(basePath: kotlin.String = defaultBasePath, client: OkHtt */ @Suppress("UNCHECKED_CAST") @Throws(IllegalStateException::class, IOException::class, UnsupportedOperationException::class, ClientException::class, ServerException::class) - fun authenticatorsAdminTotpUpdate(id: kotlin.Int, toTPDeviceRequest: TOTPDeviceRequest) : TOTPDevice { - val localVarResponse = authenticatorsAdminTotpUpdateWithHttpInfo(id = id, toTPDeviceRequest = toTPDeviceRequest) + fun authenticatorsAdminStaticUpdate(id: kotlin.Int, staticDeviceRequest: StaticDeviceRequest) : StaticDevice { + val localVarResponse = authenticatorsAdminStaticUpdateWithHttpInfo(id = id, staticDeviceRequest = staticDeviceRequest) return when (localVarResponse.responseType) { - ResponseType.Success -> (localVarResponse as Success<*>).data as TOTPDevice + ResponseType.Success -> (localVarResponse as Success<*>).data as StaticDevice ResponseType.Informational -> throw UnsupportedOperationException("Client does not support Informational responses.") ResponseType.Redirection -> throw UnsupportedOperationException("Client does not support Redirection responses.") ResponseType.ClientError -> { @@ -1951,32 +1960,32 @@ class AuthenticatorsApi(basePath: kotlin.String = defaultBasePath, client: OkHtt /** * - * Viewset for totp authenticator devices (for admins) - * @param id A unique integer value identifying this TOTP Device. - * @param toTPDeviceRequest - * @return ApiResponse + * Viewset for static authenticator devices (for admins) + * @param id A unique integer value identifying this Static Device. + * @param staticDeviceRequest + * @return ApiResponse * @throws IllegalStateException If the request is not correctly configured * @throws IOException Rethrows the OkHttp execute method exception */ @Suppress("UNCHECKED_CAST") @Throws(IllegalStateException::class, IOException::class) - fun authenticatorsAdminTotpUpdateWithHttpInfo(id: kotlin.Int, toTPDeviceRequest: TOTPDeviceRequest) : ApiResponse { - val localVariableConfig = authenticatorsAdminTotpUpdateRequestConfig(id = id, toTPDeviceRequest = toTPDeviceRequest) + fun authenticatorsAdminStaticUpdateWithHttpInfo(id: kotlin.Int, staticDeviceRequest: StaticDeviceRequest) : ApiResponse { + val localVariableConfig = authenticatorsAdminStaticUpdateRequestConfig(id = id, staticDeviceRequest = staticDeviceRequest) - return request( + return request( localVariableConfig ) } /** - * To obtain the request config of the operation authenticatorsAdminTotpUpdate + * To obtain the request config of the operation authenticatorsAdminStaticUpdate * - * @param id A unique integer value identifying this TOTP Device. - * @param toTPDeviceRequest + * @param id A unique integer value identifying this Static Device. + * @param staticDeviceRequest * @return RequestConfig */ - fun authenticatorsAdminTotpUpdateRequestConfig(id: kotlin.Int, toTPDeviceRequest: TOTPDeviceRequest) : RequestConfig { - val localVariableBody = toTPDeviceRequest + fun authenticatorsAdminStaticUpdateRequestConfig(id: kotlin.Int, staticDeviceRequest: StaticDeviceRequest) : RequestConfig { + val localVariableBody = staticDeviceRequest val localVariableQuery: MultiValueMap = mutableMapOf() val localVariableHeaders: MutableMap = mutableMapOf() localVariableHeaders["Content-Type"] = "application/json" @@ -1984,7 +1993,7 @@ class AuthenticatorsApi(basePath: kotlin.String = defaultBasePath, client: OkHtt return RequestConfig( method = RequestMethod.PUT, - path = "/authenticators/admin/totp/{id}/".replace("{"+"id"+"}", encodeURIComponent(id.toString())), + path = "/authenticators/admin/static/{id}/".replace("{"+"id"+"}", encodeURIComponent(id.toString())), query = localVariableQuery, headers = localVariableHeaders, requiresAuthentication = true, @@ -1994,9 +2003,9 @@ class AuthenticatorsApi(basePath: kotlin.String = defaultBasePath, client: OkHtt /** * - * Viewset for WebAuthn authenticator devices (for admins) - * @param webAuthnDeviceRequest - * @return WebAuthnDevice + * Viewset for totp authenticator devices (for admins) + * @param toTPDeviceRequest + * @return TOTPDevice * @throws IllegalStateException If the request is not correctly configured * @throws IOException Rethrows the OkHttp execute method exception * @throws UnsupportedOperationException If the API returns an informational or redirection response @@ -2005,11 +2014,11 @@ class AuthenticatorsApi(basePath: kotlin.String = defaultBasePath, client: OkHtt */ @Suppress("UNCHECKED_CAST") @Throws(IllegalStateException::class, IOException::class, UnsupportedOperationException::class, ClientException::class, ServerException::class) - fun authenticatorsAdminWebauthnCreate(webAuthnDeviceRequest: WebAuthnDeviceRequest) : WebAuthnDevice { - val localVarResponse = authenticatorsAdminWebauthnCreateWithHttpInfo(webAuthnDeviceRequest = webAuthnDeviceRequest) + fun authenticatorsAdminTotpCreate(toTPDeviceRequest: TOTPDeviceRequest) : TOTPDevice { + val localVarResponse = authenticatorsAdminTotpCreateWithHttpInfo(toTPDeviceRequest = toTPDeviceRequest) return when (localVarResponse.responseType) { - ResponseType.Success -> (localVarResponse as Success<*>).data as WebAuthnDevice + ResponseType.Success -> (localVarResponse as Success<*>).data as TOTPDevice ResponseType.Informational -> throw UnsupportedOperationException("Client does not support Informational responses.") ResponseType.Redirection -> throw UnsupportedOperationException("Client does not support Redirection responses.") ResponseType.ClientError -> { @@ -2025,30 +2034,30 @@ class AuthenticatorsApi(basePath: kotlin.String = defaultBasePath, client: OkHtt /** * - * Viewset for WebAuthn authenticator devices (for admins) - * @param webAuthnDeviceRequest - * @return ApiResponse + * Viewset for totp authenticator devices (for admins) + * @param toTPDeviceRequest + * @return ApiResponse * @throws IllegalStateException If the request is not correctly configured * @throws IOException Rethrows the OkHttp execute method exception */ @Suppress("UNCHECKED_CAST") @Throws(IllegalStateException::class, IOException::class) - fun authenticatorsAdminWebauthnCreateWithHttpInfo(webAuthnDeviceRequest: WebAuthnDeviceRequest) : ApiResponse { - val localVariableConfig = authenticatorsAdminWebauthnCreateRequestConfig(webAuthnDeviceRequest = webAuthnDeviceRequest) + fun authenticatorsAdminTotpCreateWithHttpInfo(toTPDeviceRequest: TOTPDeviceRequest) : ApiResponse { + val localVariableConfig = authenticatorsAdminTotpCreateRequestConfig(toTPDeviceRequest = toTPDeviceRequest) - return request( + return request( localVariableConfig ) } /** - * To obtain the request config of the operation authenticatorsAdminWebauthnCreate + * To obtain the request config of the operation authenticatorsAdminTotpCreate * - * @param webAuthnDeviceRequest + * @param toTPDeviceRequest * @return RequestConfig */ - fun authenticatorsAdminWebauthnCreateRequestConfig(webAuthnDeviceRequest: WebAuthnDeviceRequest) : RequestConfig { - val localVariableBody = webAuthnDeviceRequest + fun authenticatorsAdminTotpCreateRequestConfig(toTPDeviceRequest: TOTPDeviceRequest) : RequestConfig { + val localVariableBody = toTPDeviceRequest val localVariableQuery: MultiValueMap = mutableMapOf() val localVariableHeaders: MutableMap = mutableMapOf() localVariableHeaders["Content-Type"] = "application/json" @@ -2056,7 +2065,7 @@ class AuthenticatorsApi(basePath: kotlin.String = defaultBasePath, client: OkHtt return RequestConfig( method = RequestMethod.POST, - path = "/authenticators/admin/webauthn/", + path = "/authenticators/admin/totp/", query = localVariableQuery, headers = localVariableHeaders, requiresAuthentication = true, @@ -2066,8 +2075,8 @@ class AuthenticatorsApi(basePath: kotlin.String = defaultBasePath, client: OkHtt /** * - * Viewset for WebAuthn authenticator devices (for admins) - * @param id A unique integer value identifying this WebAuthn Device. + * Viewset for totp authenticator devices (for admins) + * @param id A unique integer value identifying this TOTP Device. * @return void * @throws IllegalStateException If the request is not correctly configured * @throws IOException Rethrows the OkHttp execute method exception @@ -2076,8 +2085,8 @@ class AuthenticatorsApi(basePath: kotlin.String = defaultBasePath, client: OkHtt * @throws ServerException If the API returns a server error response */ @Throws(IllegalStateException::class, IOException::class, UnsupportedOperationException::class, ClientException::class, ServerException::class) - fun authenticatorsAdminWebauthnDestroy(id: kotlin.Int) : Unit { - val localVarResponse = authenticatorsAdminWebauthnDestroyWithHttpInfo(id = id) + fun authenticatorsAdminTotpDestroy(id: kotlin.Int) : Unit { + val localVarResponse = authenticatorsAdminTotpDestroyWithHttpInfo(id = id) return when (localVarResponse.responseType) { ResponseType.Success -> Unit @@ -2096,15 +2105,15 @@ class AuthenticatorsApi(basePath: kotlin.String = defaultBasePath, client: OkHtt /** * - * Viewset for WebAuthn authenticator devices (for admins) - * @param id A unique integer value identifying this WebAuthn Device. + * Viewset for totp authenticator devices (for admins) + * @param id A unique integer value identifying this TOTP Device. * @return ApiResponse * @throws IllegalStateException If the request is not correctly configured * @throws IOException Rethrows the OkHttp execute method exception */ @Throws(IllegalStateException::class, IOException::class) - fun authenticatorsAdminWebauthnDestroyWithHttpInfo(id: kotlin.Int) : ApiResponse { - val localVariableConfig = authenticatorsAdminWebauthnDestroyRequestConfig(id = id) + fun authenticatorsAdminTotpDestroyWithHttpInfo(id: kotlin.Int) : ApiResponse { + val localVariableConfig = authenticatorsAdminTotpDestroyRequestConfig(id = id) return request( localVariableConfig @@ -2112,12 +2121,12 @@ class AuthenticatorsApi(basePath: kotlin.String = defaultBasePath, client: OkHtt } /** - * To obtain the request config of the operation authenticatorsAdminWebauthnDestroy + * To obtain the request config of the operation authenticatorsAdminTotpDestroy * - * @param id A unique integer value identifying this WebAuthn Device. + * @param id A unique integer value identifying this TOTP Device. * @return RequestConfig */ - fun authenticatorsAdminWebauthnDestroyRequestConfig(id: kotlin.Int) : RequestConfig { + fun authenticatorsAdminTotpDestroyRequestConfig(id: kotlin.Int) : RequestConfig { val localVariableBody = null val localVariableQuery: MultiValueMap = mutableMapOf() val localVariableHeaders: MutableMap = mutableMapOf() @@ -2125,7 +2134,7 @@ class AuthenticatorsApi(basePath: kotlin.String = defaultBasePath, client: OkHtt return RequestConfig( method = RequestMethod.DELETE, - path = "/authenticators/admin/webauthn/{id}/".replace("{"+"id"+"}", encodeURIComponent(id.toString())), + path = "/authenticators/admin/totp/{id}/".replace("{"+"id"+"}", encodeURIComponent(id.toString())), query = localVariableQuery, headers = localVariableHeaders, requiresAuthentication = true, @@ -2135,13 +2144,13 @@ class AuthenticatorsApi(basePath: kotlin.String = defaultBasePath, client: OkHtt /** * - * Viewset for WebAuthn authenticator devices (for admins) + * Viewset for totp authenticator devices (for admins) * @param name (optional) * @param ordering Which field to use when ordering the results. (optional) * @param page A page number within the paginated result set. (optional) * @param pageSize Number of results to return per page. (optional) * @param search A search term. (optional) - * @return PaginatedWebAuthnDeviceList + * @return PaginatedTOTPDeviceList * @throws IllegalStateException If the request is not correctly configured * @throws IOException Rethrows the OkHttp execute method exception * @throws UnsupportedOperationException If the API returns an informational or redirection response @@ -2150,11 +2159,11 @@ class AuthenticatorsApi(basePath: kotlin.String = defaultBasePath, client: OkHtt */ @Suppress("UNCHECKED_CAST") @Throws(IllegalStateException::class, IOException::class, UnsupportedOperationException::class, ClientException::class, ServerException::class) - fun authenticatorsAdminWebauthnList(name: kotlin.String? = null, ordering: kotlin.String? = null, page: kotlin.Int? = null, pageSize: kotlin.Int? = null, search: kotlin.String? = null) : PaginatedWebAuthnDeviceList { - val localVarResponse = authenticatorsAdminWebauthnListWithHttpInfo(name = name, ordering = ordering, page = page, pageSize = pageSize, search = search) + fun authenticatorsAdminTotpList(name: kotlin.String? = null, ordering: kotlin.String? = null, page: kotlin.Int? = null, pageSize: kotlin.Int? = null, search: kotlin.String? = null) : PaginatedTOTPDeviceList { + val localVarResponse = authenticatorsAdminTotpListWithHttpInfo(name = name, ordering = ordering, page = page, pageSize = pageSize, search = search) return when (localVarResponse.responseType) { - ResponseType.Success -> (localVarResponse as Success<*>).data as PaginatedWebAuthnDeviceList + ResponseType.Success -> (localVarResponse as Success<*>).data as PaginatedTOTPDeviceList ResponseType.Informational -> throw UnsupportedOperationException("Client does not support Informational responses.") ResponseType.Redirection -> throw UnsupportedOperationException("Client does not support Redirection responses.") ResponseType.ClientError -> { @@ -2170,28 +2179,28 @@ class AuthenticatorsApi(basePath: kotlin.String = defaultBasePath, client: OkHtt /** * - * Viewset for WebAuthn authenticator devices (for admins) + * Viewset for totp authenticator devices (for admins) * @param name (optional) * @param ordering Which field to use when ordering the results. (optional) * @param page A page number within the paginated result set. (optional) * @param pageSize Number of results to return per page. (optional) * @param search A search term. (optional) - * @return ApiResponse + * @return ApiResponse * @throws IllegalStateException If the request is not correctly configured * @throws IOException Rethrows the OkHttp execute method exception */ @Suppress("UNCHECKED_CAST") @Throws(IllegalStateException::class, IOException::class) - fun authenticatorsAdminWebauthnListWithHttpInfo(name: kotlin.String?, ordering: kotlin.String?, page: kotlin.Int?, pageSize: kotlin.Int?, search: kotlin.String?) : ApiResponse { - val localVariableConfig = authenticatorsAdminWebauthnListRequestConfig(name = name, ordering = ordering, page = page, pageSize = pageSize, search = search) + fun authenticatorsAdminTotpListWithHttpInfo(name: kotlin.String?, ordering: kotlin.String?, page: kotlin.Int?, pageSize: kotlin.Int?, search: kotlin.String?) : ApiResponse { + val localVariableConfig = authenticatorsAdminTotpListRequestConfig(name = name, ordering = ordering, page = page, pageSize = pageSize, search = search) - return request( + return request( localVariableConfig ) } /** - * To obtain the request config of the operation authenticatorsAdminWebauthnList + * To obtain the request config of the operation authenticatorsAdminTotpList * * @param name (optional) * @param ordering Which field to use when ordering the results. (optional) @@ -2200,7 +2209,7 @@ class AuthenticatorsApi(basePath: kotlin.String = defaultBasePath, client: OkHtt * @param search A search term. (optional) * @return RequestConfig */ - fun authenticatorsAdminWebauthnListRequestConfig(name: kotlin.String?, ordering: kotlin.String?, page: kotlin.Int?, pageSize: kotlin.Int?, search: kotlin.String?) : RequestConfig { + fun authenticatorsAdminTotpListRequestConfig(name: kotlin.String?, ordering: kotlin.String?, page: kotlin.Int?, pageSize: kotlin.Int?, search: kotlin.String?) : RequestConfig { val localVariableBody = null val localVariableQuery: MultiValueMap = mutableMapOf>() .apply { @@ -2225,7 +2234,7 @@ class AuthenticatorsApi(basePath: kotlin.String = defaultBasePath, client: OkHtt return RequestConfig( method = RequestMethod.GET, - path = "/authenticators/admin/webauthn/", + path = "/authenticators/admin/totp/", query = localVariableQuery, headers = localVariableHeaders, requiresAuthentication = true, @@ -2235,10 +2244,10 @@ class AuthenticatorsApi(basePath: kotlin.String = defaultBasePath, client: OkHtt /** * - * Viewset for WebAuthn authenticator devices (for admins) - * @param id A unique integer value identifying this WebAuthn Device. - * @param patchedWebAuthnDeviceRequest (optional) - * @return WebAuthnDevice + * Viewset for totp authenticator devices (for admins) + * @param id A unique integer value identifying this TOTP Device. + * @param patchedTOTPDeviceRequest (optional) + * @return TOTPDevice * @throws IllegalStateException If the request is not correctly configured * @throws IOException Rethrows the OkHttp execute method exception * @throws UnsupportedOperationException If the API returns an informational or redirection response @@ -2247,11 +2256,1151 @@ class AuthenticatorsApi(basePath: kotlin.String = defaultBasePath, client: OkHtt */ @Suppress("UNCHECKED_CAST") @Throws(IllegalStateException::class, IOException::class, UnsupportedOperationException::class, ClientException::class, ServerException::class) - fun authenticatorsAdminWebauthnPartialUpdate(id: kotlin.Int, patchedWebAuthnDeviceRequest: PatchedWebAuthnDeviceRequest? = null) : WebAuthnDevice { - val localVarResponse = authenticatorsAdminWebauthnPartialUpdateWithHttpInfo(id = id, patchedWebAuthnDeviceRequest = patchedWebAuthnDeviceRequest) + fun authenticatorsAdminTotpPartialUpdate(id: kotlin.Int, patchedTOTPDeviceRequest: PatchedTOTPDeviceRequest? = null) : TOTPDevice { + val localVarResponse = authenticatorsAdminTotpPartialUpdateWithHttpInfo(id = id, patchedTOTPDeviceRequest = patchedTOTPDeviceRequest) + + return when (localVarResponse.responseType) { + ResponseType.Success -> (localVarResponse as Success<*>).data as TOTPDevice + ResponseType.Informational -> throw UnsupportedOperationException("Client does not support Informational responses.") + ResponseType.Redirection -> throw UnsupportedOperationException("Client does not support Redirection responses.") + ResponseType.ClientError -> { + val localVarError = localVarResponse as ClientError<*> + throw ClientException("Client error : ${localVarError.statusCode} ${localVarError.message.orEmpty()}", localVarError.statusCode, localVarResponse) + } + ResponseType.ServerError -> { + val localVarError = localVarResponse as ServerError<*> + throw ServerException("Server error : ${localVarError.statusCode} ${localVarError.message.orEmpty()} ${localVarError.body}", localVarError.statusCode, localVarResponse) + } + } + } + + /** + * + * Viewset for totp authenticator devices (for admins) + * @param id A unique integer value identifying this TOTP Device. + * @param patchedTOTPDeviceRequest (optional) + * @return ApiResponse + * @throws IllegalStateException If the request is not correctly configured + * @throws IOException Rethrows the OkHttp execute method exception + */ + @Suppress("UNCHECKED_CAST") + @Throws(IllegalStateException::class, IOException::class) + fun authenticatorsAdminTotpPartialUpdateWithHttpInfo(id: kotlin.Int, patchedTOTPDeviceRequest: PatchedTOTPDeviceRequest?) : ApiResponse { + val localVariableConfig = authenticatorsAdminTotpPartialUpdateRequestConfig(id = id, patchedTOTPDeviceRequest = patchedTOTPDeviceRequest) + + return request( + localVariableConfig + ) + } + + /** + * To obtain the request config of the operation authenticatorsAdminTotpPartialUpdate + * + * @param id A unique integer value identifying this TOTP Device. + * @param patchedTOTPDeviceRequest (optional) + * @return RequestConfig + */ + fun authenticatorsAdminTotpPartialUpdateRequestConfig(id: kotlin.Int, patchedTOTPDeviceRequest: PatchedTOTPDeviceRequest?) : RequestConfig { + val localVariableBody = patchedTOTPDeviceRequest + val localVariableQuery: MultiValueMap = mutableMapOf() + val localVariableHeaders: MutableMap = mutableMapOf() + localVariableHeaders["Content-Type"] = "application/json" + localVariableHeaders["Accept"] = "application/json" + + return RequestConfig( + method = RequestMethod.PATCH, + path = "/authenticators/admin/totp/{id}/".replace("{"+"id"+"}", encodeURIComponent(id.toString())), + query = localVariableQuery, + headers = localVariableHeaders, + requiresAuthentication = true, + body = localVariableBody + ) + } + + /** + * + * Viewset for totp authenticator devices (for admins) + * @param id A unique integer value identifying this TOTP Device. + * @return TOTPDevice + * @throws IllegalStateException If the request is not correctly configured + * @throws IOException Rethrows the OkHttp execute method exception + * @throws UnsupportedOperationException If the API returns an informational or redirection response + * @throws ClientException If the API returns a client error response + * @throws ServerException If the API returns a server error response + */ + @Suppress("UNCHECKED_CAST") + @Throws(IllegalStateException::class, IOException::class, UnsupportedOperationException::class, ClientException::class, ServerException::class) + fun authenticatorsAdminTotpRetrieve(id: kotlin.Int) : TOTPDevice { + val localVarResponse = authenticatorsAdminTotpRetrieveWithHttpInfo(id = id) + + return when (localVarResponse.responseType) { + ResponseType.Success -> (localVarResponse as Success<*>).data as TOTPDevice + ResponseType.Informational -> throw UnsupportedOperationException("Client does not support Informational responses.") + ResponseType.Redirection -> throw UnsupportedOperationException("Client does not support Redirection responses.") + ResponseType.ClientError -> { + val localVarError = localVarResponse as ClientError<*> + throw ClientException("Client error : ${localVarError.statusCode} ${localVarError.message.orEmpty()}", localVarError.statusCode, localVarResponse) + } + ResponseType.ServerError -> { + val localVarError = localVarResponse as ServerError<*> + throw ServerException("Server error : ${localVarError.statusCode} ${localVarError.message.orEmpty()} ${localVarError.body}", localVarError.statusCode, localVarResponse) + } + } + } + + /** + * + * Viewset for totp authenticator devices (for admins) + * @param id A unique integer value identifying this TOTP Device. + * @return ApiResponse + * @throws IllegalStateException If the request is not correctly configured + * @throws IOException Rethrows the OkHttp execute method exception + */ + @Suppress("UNCHECKED_CAST") + @Throws(IllegalStateException::class, IOException::class) + fun authenticatorsAdminTotpRetrieveWithHttpInfo(id: kotlin.Int) : ApiResponse { + val localVariableConfig = authenticatorsAdminTotpRetrieveRequestConfig(id = id) + + return request( + localVariableConfig + ) + } + + /** + * To obtain the request config of the operation authenticatorsAdminTotpRetrieve + * + * @param id A unique integer value identifying this TOTP Device. + * @return RequestConfig + */ + fun authenticatorsAdminTotpRetrieveRequestConfig(id: kotlin.Int) : RequestConfig { + val localVariableBody = null + val localVariableQuery: MultiValueMap = mutableMapOf() + val localVariableHeaders: MutableMap = mutableMapOf() + localVariableHeaders["Accept"] = "application/json" + + return RequestConfig( + method = RequestMethod.GET, + path = "/authenticators/admin/totp/{id}/".replace("{"+"id"+"}", encodeURIComponent(id.toString())), + query = localVariableQuery, + headers = localVariableHeaders, + requiresAuthentication = true, + body = localVariableBody + ) + } + + /** + * + * Viewset for totp authenticator devices (for admins) + * @param id A unique integer value identifying this TOTP Device. + * @param toTPDeviceRequest + * @return TOTPDevice + * @throws IllegalStateException If the request is not correctly configured + * @throws IOException Rethrows the OkHttp execute method exception + * @throws UnsupportedOperationException If the API returns an informational or redirection response + * @throws ClientException If the API returns a client error response + * @throws ServerException If the API returns a server error response + */ + @Suppress("UNCHECKED_CAST") + @Throws(IllegalStateException::class, IOException::class, UnsupportedOperationException::class, ClientException::class, ServerException::class) + fun authenticatorsAdminTotpUpdate(id: kotlin.Int, toTPDeviceRequest: TOTPDeviceRequest) : TOTPDevice { + val localVarResponse = authenticatorsAdminTotpUpdateWithHttpInfo(id = id, toTPDeviceRequest = toTPDeviceRequest) + + return when (localVarResponse.responseType) { + ResponseType.Success -> (localVarResponse as Success<*>).data as TOTPDevice + ResponseType.Informational -> throw UnsupportedOperationException("Client does not support Informational responses.") + ResponseType.Redirection -> throw UnsupportedOperationException("Client does not support Redirection responses.") + ResponseType.ClientError -> { + val localVarError = localVarResponse as ClientError<*> + throw ClientException("Client error : ${localVarError.statusCode} ${localVarError.message.orEmpty()}", localVarError.statusCode, localVarResponse) + } + ResponseType.ServerError -> { + val localVarError = localVarResponse as ServerError<*> + throw ServerException("Server error : ${localVarError.statusCode} ${localVarError.message.orEmpty()} ${localVarError.body}", localVarError.statusCode, localVarResponse) + } + } + } + + /** + * + * Viewset for totp authenticator devices (for admins) + * @param id A unique integer value identifying this TOTP Device. + * @param toTPDeviceRequest + * @return ApiResponse + * @throws IllegalStateException If the request is not correctly configured + * @throws IOException Rethrows the OkHttp execute method exception + */ + @Suppress("UNCHECKED_CAST") + @Throws(IllegalStateException::class, IOException::class) + fun authenticatorsAdminTotpUpdateWithHttpInfo(id: kotlin.Int, toTPDeviceRequest: TOTPDeviceRequest) : ApiResponse { + val localVariableConfig = authenticatorsAdminTotpUpdateRequestConfig(id = id, toTPDeviceRequest = toTPDeviceRequest) + + return request( + localVariableConfig + ) + } + + /** + * To obtain the request config of the operation authenticatorsAdminTotpUpdate + * + * @param id A unique integer value identifying this TOTP Device. + * @param toTPDeviceRequest + * @return RequestConfig + */ + fun authenticatorsAdminTotpUpdateRequestConfig(id: kotlin.Int, toTPDeviceRequest: TOTPDeviceRequest) : RequestConfig { + val localVariableBody = toTPDeviceRequest + val localVariableQuery: MultiValueMap = mutableMapOf() + val localVariableHeaders: MutableMap = mutableMapOf() + localVariableHeaders["Content-Type"] = "application/json" + localVariableHeaders["Accept"] = "application/json" + + return RequestConfig( + method = RequestMethod.PUT, + path = "/authenticators/admin/totp/{id}/".replace("{"+"id"+"}", encodeURIComponent(id.toString())), + query = localVariableQuery, + headers = localVariableHeaders, + requiresAuthentication = true, + body = localVariableBody + ) + } + + /** + * + * Viewset for WebAuthn authenticator devices (for admins) + * @param webAuthnDeviceRequest + * @return WebAuthnDevice + * @throws IllegalStateException If the request is not correctly configured + * @throws IOException Rethrows the OkHttp execute method exception + * @throws UnsupportedOperationException If the API returns an informational or redirection response + * @throws ClientException If the API returns a client error response + * @throws ServerException If the API returns a server error response + */ + @Suppress("UNCHECKED_CAST") + @Throws(IllegalStateException::class, IOException::class, UnsupportedOperationException::class, ClientException::class, ServerException::class) + fun authenticatorsAdminWebauthnCreate(webAuthnDeviceRequest: WebAuthnDeviceRequest) : WebAuthnDevice { + val localVarResponse = authenticatorsAdminWebauthnCreateWithHttpInfo(webAuthnDeviceRequest = webAuthnDeviceRequest) + + return when (localVarResponse.responseType) { + ResponseType.Success -> (localVarResponse as Success<*>).data as WebAuthnDevice + ResponseType.Informational -> throw UnsupportedOperationException("Client does not support Informational responses.") + ResponseType.Redirection -> throw UnsupportedOperationException("Client does not support Redirection responses.") + ResponseType.ClientError -> { + val localVarError = localVarResponse as ClientError<*> + throw ClientException("Client error : ${localVarError.statusCode} ${localVarError.message.orEmpty()}", localVarError.statusCode, localVarResponse) + } + ResponseType.ServerError -> { + val localVarError = localVarResponse as ServerError<*> + throw ServerException("Server error : ${localVarError.statusCode} ${localVarError.message.orEmpty()} ${localVarError.body}", localVarError.statusCode, localVarResponse) + } + } + } + + /** + * + * Viewset for WebAuthn authenticator devices (for admins) + * @param webAuthnDeviceRequest + * @return ApiResponse + * @throws IllegalStateException If the request is not correctly configured + * @throws IOException Rethrows the OkHttp execute method exception + */ + @Suppress("UNCHECKED_CAST") + @Throws(IllegalStateException::class, IOException::class) + fun authenticatorsAdminWebauthnCreateWithHttpInfo(webAuthnDeviceRequest: WebAuthnDeviceRequest) : ApiResponse { + val localVariableConfig = authenticatorsAdminWebauthnCreateRequestConfig(webAuthnDeviceRequest = webAuthnDeviceRequest) + + return request( + localVariableConfig + ) + } + + /** + * To obtain the request config of the operation authenticatorsAdminWebauthnCreate + * + * @param webAuthnDeviceRequest + * @return RequestConfig + */ + fun authenticatorsAdminWebauthnCreateRequestConfig(webAuthnDeviceRequest: WebAuthnDeviceRequest) : RequestConfig { + val localVariableBody = webAuthnDeviceRequest + val localVariableQuery: MultiValueMap = mutableMapOf() + val localVariableHeaders: MutableMap = mutableMapOf() + localVariableHeaders["Content-Type"] = "application/json" + localVariableHeaders["Accept"] = "application/json" + + return RequestConfig( + method = RequestMethod.POST, + path = "/authenticators/admin/webauthn/", + query = localVariableQuery, + headers = localVariableHeaders, + requiresAuthentication = true, + body = localVariableBody + ) + } + + /** + * + * Viewset for WebAuthn authenticator devices (for admins) + * @param id A unique integer value identifying this WebAuthn Device. + * @return void + * @throws IllegalStateException If the request is not correctly configured + * @throws IOException Rethrows the OkHttp execute method exception + * @throws UnsupportedOperationException If the API returns an informational or redirection response + * @throws ClientException If the API returns a client error response + * @throws ServerException If the API returns a server error response + */ + @Throws(IllegalStateException::class, IOException::class, UnsupportedOperationException::class, ClientException::class, ServerException::class) + fun authenticatorsAdminWebauthnDestroy(id: kotlin.Int) : Unit { + val localVarResponse = authenticatorsAdminWebauthnDestroyWithHttpInfo(id = id) + + return when (localVarResponse.responseType) { + ResponseType.Success -> Unit + ResponseType.Informational -> throw UnsupportedOperationException("Client does not support Informational responses.") + ResponseType.Redirection -> throw UnsupportedOperationException("Client does not support Redirection responses.") + ResponseType.ClientError -> { + val localVarError = localVarResponse as ClientError<*> + throw ClientException("Client error : ${localVarError.statusCode} ${localVarError.message.orEmpty()}", localVarError.statusCode, localVarResponse) + } + ResponseType.ServerError -> { + val localVarError = localVarResponse as ServerError<*> + throw ServerException("Server error : ${localVarError.statusCode} ${localVarError.message.orEmpty()} ${localVarError.body}", localVarError.statusCode, localVarResponse) + } + } + } + + /** + * + * Viewset for WebAuthn authenticator devices (for admins) + * @param id A unique integer value identifying this WebAuthn Device. + * @return ApiResponse + * @throws IllegalStateException If the request is not correctly configured + * @throws IOException Rethrows the OkHttp execute method exception + */ + @Throws(IllegalStateException::class, IOException::class) + fun authenticatorsAdminWebauthnDestroyWithHttpInfo(id: kotlin.Int) : ApiResponse { + val localVariableConfig = authenticatorsAdminWebauthnDestroyRequestConfig(id = id) + + return request( + localVariableConfig + ) + } + + /** + * To obtain the request config of the operation authenticatorsAdminWebauthnDestroy + * + * @param id A unique integer value identifying this WebAuthn Device. + * @return RequestConfig + */ + fun authenticatorsAdminWebauthnDestroyRequestConfig(id: kotlin.Int) : RequestConfig { + val localVariableBody = null + val localVariableQuery: MultiValueMap = mutableMapOf() + val localVariableHeaders: MutableMap = mutableMapOf() + localVariableHeaders["Accept"] = "application/json" + + return RequestConfig( + method = RequestMethod.DELETE, + path = "/authenticators/admin/webauthn/{id}/".replace("{"+"id"+"}", encodeURIComponent(id.toString())), + query = localVariableQuery, + headers = localVariableHeaders, + requiresAuthentication = true, + body = localVariableBody + ) + } + + /** + * + * Viewset for WebAuthn authenticator devices (for admins) + * @param name (optional) + * @param ordering Which field to use when ordering the results. (optional) + * @param page A page number within the paginated result set. (optional) + * @param pageSize Number of results to return per page. (optional) + * @param search A search term. (optional) + * @return PaginatedWebAuthnDeviceList + * @throws IllegalStateException If the request is not correctly configured + * @throws IOException Rethrows the OkHttp execute method exception + * @throws UnsupportedOperationException If the API returns an informational or redirection response + * @throws ClientException If the API returns a client error response + * @throws ServerException If the API returns a server error response + */ + @Suppress("UNCHECKED_CAST") + @Throws(IllegalStateException::class, IOException::class, UnsupportedOperationException::class, ClientException::class, ServerException::class) + fun authenticatorsAdminWebauthnList(name: kotlin.String? = null, ordering: kotlin.String? = null, page: kotlin.Int? = null, pageSize: kotlin.Int? = null, search: kotlin.String? = null) : PaginatedWebAuthnDeviceList { + val localVarResponse = authenticatorsAdminWebauthnListWithHttpInfo(name = name, ordering = ordering, page = page, pageSize = pageSize, search = search) + + return when (localVarResponse.responseType) { + ResponseType.Success -> (localVarResponse as Success<*>).data as PaginatedWebAuthnDeviceList + ResponseType.Informational -> throw UnsupportedOperationException("Client does not support Informational responses.") + ResponseType.Redirection -> throw UnsupportedOperationException("Client does not support Redirection responses.") + ResponseType.ClientError -> { + val localVarError = localVarResponse as ClientError<*> + throw ClientException("Client error : ${localVarError.statusCode} ${localVarError.message.orEmpty()}", localVarError.statusCode, localVarResponse) + } + ResponseType.ServerError -> { + val localVarError = localVarResponse as ServerError<*> + throw ServerException("Server error : ${localVarError.statusCode} ${localVarError.message.orEmpty()} ${localVarError.body}", localVarError.statusCode, localVarResponse) + } + } + } + + /** + * + * Viewset for WebAuthn authenticator devices (for admins) + * @param name (optional) + * @param ordering Which field to use when ordering the results. (optional) + * @param page A page number within the paginated result set. (optional) + * @param pageSize Number of results to return per page. (optional) + * @param search A search term. (optional) + * @return ApiResponse + * @throws IllegalStateException If the request is not correctly configured + * @throws IOException Rethrows the OkHttp execute method exception + */ + @Suppress("UNCHECKED_CAST") + @Throws(IllegalStateException::class, IOException::class) + fun authenticatorsAdminWebauthnListWithHttpInfo(name: kotlin.String?, ordering: kotlin.String?, page: kotlin.Int?, pageSize: kotlin.Int?, search: kotlin.String?) : ApiResponse { + val localVariableConfig = authenticatorsAdminWebauthnListRequestConfig(name = name, ordering = ordering, page = page, pageSize = pageSize, search = search) + + return request( + localVariableConfig + ) + } + + /** + * To obtain the request config of the operation authenticatorsAdminWebauthnList + * + * @param name (optional) + * @param ordering Which field to use when ordering the results. (optional) + * @param page A page number within the paginated result set. (optional) + * @param pageSize Number of results to return per page. (optional) + * @param search A search term. (optional) + * @return RequestConfig + */ + fun authenticatorsAdminWebauthnListRequestConfig(name: kotlin.String?, ordering: kotlin.String?, page: kotlin.Int?, pageSize: kotlin.Int?, search: kotlin.String?) : RequestConfig { + val localVariableBody = null + val localVariableQuery: MultiValueMap = mutableMapOf>() + .apply { + if (name != null) { + put("name", listOf(name.toString())) + } + if (ordering != null) { + put("ordering", listOf(ordering.toString())) + } + if (page != null) { + put("page", listOf(page.toString())) + } + if (pageSize != null) { + put("page_size", listOf(pageSize.toString())) + } + if (search != null) { + put("search", listOf(search.toString())) + } + } + val localVariableHeaders: MutableMap = mutableMapOf() + localVariableHeaders["Accept"] = "application/json" + + return RequestConfig( + method = RequestMethod.GET, + path = "/authenticators/admin/webauthn/", + query = localVariableQuery, + headers = localVariableHeaders, + requiresAuthentication = true, + body = localVariableBody + ) + } + + /** + * + * Viewset for WebAuthn authenticator devices (for admins) + * @param id A unique integer value identifying this WebAuthn Device. + * @param patchedWebAuthnDeviceRequest (optional) + * @return WebAuthnDevice + * @throws IllegalStateException If the request is not correctly configured + * @throws IOException Rethrows the OkHttp execute method exception + * @throws UnsupportedOperationException If the API returns an informational or redirection response + * @throws ClientException If the API returns a client error response + * @throws ServerException If the API returns a server error response + */ + @Suppress("UNCHECKED_CAST") + @Throws(IllegalStateException::class, IOException::class, UnsupportedOperationException::class, ClientException::class, ServerException::class) + fun authenticatorsAdminWebauthnPartialUpdate(id: kotlin.Int, patchedWebAuthnDeviceRequest: PatchedWebAuthnDeviceRequest? = null) : WebAuthnDevice { + val localVarResponse = authenticatorsAdminWebauthnPartialUpdateWithHttpInfo(id = id, patchedWebAuthnDeviceRequest = patchedWebAuthnDeviceRequest) + + return when (localVarResponse.responseType) { + ResponseType.Success -> (localVarResponse as Success<*>).data as WebAuthnDevice + ResponseType.Informational -> throw UnsupportedOperationException("Client does not support Informational responses.") + ResponseType.Redirection -> throw UnsupportedOperationException("Client does not support Redirection responses.") + ResponseType.ClientError -> { + val localVarError = localVarResponse as ClientError<*> + throw ClientException("Client error : ${localVarError.statusCode} ${localVarError.message.orEmpty()}", localVarError.statusCode, localVarResponse) + } + ResponseType.ServerError -> { + val localVarError = localVarResponse as ServerError<*> + throw ServerException("Server error : ${localVarError.statusCode} ${localVarError.message.orEmpty()} ${localVarError.body}", localVarError.statusCode, localVarResponse) + } + } + } + + /** + * + * Viewset for WebAuthn authenticator devices (for admins) + * @param id A unique integer value identifying this WebAuthn Device. + * @param patchedWebAuthnDeviceRequest (optional) + * @return ApiResponse + * @throws IllegalStateException If the request is not correctly configured + * @throws IOException Rethrows the OkHttp execute method exception + */ + @Suppress("UNCHECKED_CAST") + @Throws(IllegalStateException::class, IOException::class) + fun authenticatorsAdminWebauthnPartialUpdateWithHttpInfo(id: kotlin.Int, patchedWebAuthnDeviceRequest: PatchedWebAuthnDeviceRequest?) : ApiResponse { + val localVariableConfig = authenticatorsAdminWebauthnPartialUpdateRequestConfig(id = id, patchedWebAuthnDeviceRequest = patchedWebAuthnDeviceRequest) + + return request( + localVariableConfig + ) + } + + /** + * To obtain the request config of the operation authenticatorsAdminWebauthnPartialUpdate + * + * @param id A unique integer value identifying this WebAuthn Device. + * @param patchedWebAuthnDeviceRequest (optional) + * @return RequestConfig + */ + fun authenticatorsAdminWebauthnPartialUpdateRequestConfig(id: kotlin.Int, patchedWebAuthnDeviceRequest: PatchedWebAuthnDeviceRequest?) : RequestConfig { + val localVariableBody = patchedWebAuthnDeviceRequest + val localVariableQuery: MultiValueMap = mutableMapOf() + val localVariableHeaders: MutableMap = mutableMapOf() + localVariableHeaders["Content-Type"] = "application/json" + localVariableHeaders["Accept"] = "application/json" + + return RequestConfig( + method = RequestMethod.PATCH, + path = "/authenticators/admin/webauthn/{id}/".replace("{"+"id"+"}", encodeURIComponent(id.toString())), + query = localVariableQuery, + headers = localVariableHeaders, + requiresAuthentication = true, + body = localVariableBody + ) + } + + /** + * + * Viewset for WebAuthn authenticator devices (for admins) + * @param id A unique integer value identifying this WebAuthn Device. + * @return WebAuthnDevice + * @throws IllegalStateException If the request is not correctly configured + * @throws IOException Rethrows the OkHttp execute method exception + * @throws UnsupportedOperationException If the API returns an informational or redirection response + * @throws ClientException If the API returns a client error response + * @throws ServerException If the API returns a server error response + */ + @Suppress("UNCHECKED_CAST") + @Throws(IllegalStateException::class, IOException::class, UnsupportedOperationException::class, ClientException::class, ServerException::class) + fun authenticatorsAdminWebauthnRetrieve(id: kotlin.Int) : WebAuthnDevice { + val localVarResponse = authenticatorsAdminWebauthnRetrieveWithHttpInfo(id = id) + + return when (localVarResponse.responseType) { + ResponseType.Success -> (localVarResponse as Success<*>).data as WebAuthnDevice + ResponseType.Informational -> throw UnsupportedOperationException("Client does not support Informational responses.") + ResponseType.Redirection -> throw UnsupportedOperationException("Client does not support Redirection responses.") + ResponseType.ClientError -> { + val localVarError = localVarResponse as ClientError<*> + throw ClientException("Client error : ${localVarError.statusCode} ${localVarError.message.orEmpty()}", localVarError.statusCode, localVarResponse) + } + ResponseType.ServerError -> { + val localVarError = localVarResponse as ServerError<*> + throw ServerException("Server error : ${localVarError.statusCode} ${localVarError.message.orEmpty()} ${localVarError.body}", localVarError.statusCode, localVarResponse) + } + } + } + + /** + * + * Viewset for WebAuthn authenticator devices (for admins) + * @param id A unique integer value identifying this WebAuthn Device. + * @return ApiResponse + * @throws IllegalStateException If the request is not correctly configured + * @throws IOException Rethrows the OkHttp execute method exception + */ + @Suppress("UNCHECKED_CAST") + @Throws(IllegalStateException::class, IOException::class) + fun authenticatorsAdminWebauthnRetrieveWithHttpInfo(id: kotlin.Int) : ApiResponse { + val localVariableConfig = authenticatorsAdminWebauthnRetrieveRequestConfig(id = id) + + return request( + localVariableConfig + ) + } + + /** + * To obtain the request config of the operation authenticatorsAdminWebauthnRetrieve + * + * @param id A unique integer value identifying this WebAuthn Device. + * @return RequestConfig + */ + fun authenticatorsAdminWebauthnRetrieveRequestConfig(id: kotlin.Int) : RequestConfig { + val localVariableBody = null + val localVariableQuery: MultiValueMap = mutableMapOf() + val localVariableHeaders: MutableMap = mutableMapOf() + localVariableHeaders["Accept"] = "application/json" + + return RequestConfig( + method = RequestMethod.GET, + path = "/authenticators/admin/webauthn/{id}/".replace("{"+"id"+"}", encodeURIComponent(id.toString())), + query = localVariableQuery, + headers = localVariableHeaders, + requiresAuthentication = true, + body = localVariableBody + ) + } + + /** + * + * Viewset for WebAuthn authenticator devices (for admins) + * @param id A unique integer value identifying this WebAuthn Device. + * @param webAuthnDeviceRequest + * @return WebAuthnDevice + * @throws IllegalStateException If the request is not correctly configured + * @throws IOException Rethrows the OkHttp execute method exception + * @throws UnsupportedOperationException If the API returns an informational or redirection response + * @throws ClientException If the API returns a client error response + * @throws ServerException If the API returns a server error response + */ + @Suppress("UNCHECKED_CAST") + @Throws(IllegalStateException::class, IOException::class, UnsupportedOperationException::class, ClientException::class, ServerException::class) + fun authenticatorsAdminWebauthnUpdate(id: kotlin.Int, webAuthnDeviceRequest: WebAuthnDeviceRequest) : WebAuthnDevice { + val localVarResponse = authenticatorsAdminWebauthnUpdateWithHttpInfo(id = id, webAuthnDeviceRequest = webAuthnDeviceRequest) + + return when (localVarResponse.responseType) { + ResponseType.Success -> (localVarResponse as Success<*>).data as WebAuthnDevice + ResponseType.Informational -> throw UnsupportedOperationException("Client does not support Informational responses.") + ResponseType.Redirection -> throw UnsupportedOperationException("Client does not support Redirection responses.") + ResponseType.ClientError -> { + val localVarError = localVarResponse as ClientError<*> + throw ClientException("Client error : ${localVarError.statusCode} ${localVarError.message.orEmpty()}", localVarError.statusCode, localVarResponse) + } + ResponseType.ServerError -> { + val localVarError = localVarResponse as ServerError<*> + throw ServerException("Server error : ${localVarError.statusCode} ${localVarError.message.orEmpty()} ${localVarError.body}", localVarError.statusCode, localVarResponse) + } + } + } + + /** + * + * Viewset for WebAuthn authenticator devices (for admins) + * @param id A unique integer value identifying this WebAuthn Device. + * @param webAuthnDeviceRequest + * @return ApiResponse + * @throws IllegalStateException If the request is not correctly configured + * @throws IOException Rethrows the OkHttp execute method exception + */ + @Suppress("UNCHECKED_CAST") + @Throws(IllegalStateException::class, IOException::class) + fun authenticatorsAdminWebauthnUpdateWithHttpInfo(id: kotlin.Int, webAuthnDeviceRequest: WebAuthnDeviceRequest) : ApiResponse { + val localVariableConfig = authenticatorsAdminWebauthnUpdateRequestConfig(id = id, webAuthnDeviceRequest = webAuthnDeviceRequest) + + return request( + localVariableConfig + ) + } + + /** + * To obtain the request config of the operation authenticatorsAdminWebauthnUpdate + * + * @param id A unique integer value identifying this WebAuthn Device. + * @param webAuthnDeviceRequest + * @return RequestConfig + */ + fun authenticatorsAdminWebauthnUpdateRequestConfig(id: kotlin.Int, webAuthnDeviceRequest: WebAuthnDeviceRequest) : RequestConfig { + val localVariableBody = webAuthnDeviceRequest + val localVariableQuery: MultiValueMap = mutableMapOf() + val localVariableHeaders: MutableMap = mutableMapOf() + localVariableHeaders["Content-Type"] = "application/json" + localVariableHeaders["Accept"] = "application/json" + + return RequestConfig( + method = RequestMethod.PUT, + path = "/authenticators/admin/webauthn/{id}/".replace("{"+"id"+"}", encodeURIComponent(id.toString())), + query = localVariableQuery, + headers = localVariableHeaders, + requiresAuthentication = true, + body = localVariableBody + ) + } + + /** + * + * Get all devices for current user + * @return kotlin.collections.List + * @throws IllegalStateException If the request is not correctly configured + * @throws IOException Rethrows the OkHttp execute method exception + * @throws UnsupportedOperationException If the API returns an informational or redirection response + * @throws ClientException If the API returns a client error response + * @throws ServerException If the API returns a server error response + */ + @Suppress("UNCHECKED_CAST") + @Throws(IllegalStateException::class, IOException::class, UnsupportedOperationException::class, ClientException::class, ServerException::class) + fun authenticatorsAllList() : kotlin.collections.List { + val localVarResponse = authenticatorsAllListWithHttpInfo() + + return when (localVarResponse.responseType) { + ResponseType.Success -> (localVarResponse as Success<*>).data as kotlin.collections.List + ResponseType.Informational -> throw UnsupportedOperationException("Client does not support Informational responses.") + ResponseType.Redirection -> throw UnsupportedOperationException("Client does not support Redirection responses.") + ResponseType.ClientError -> { + val localVarError = localVarResponse as ClientError<*> + throw ClientException("Client error : ${localVarError.statusCode} ${localVarError.message.orEmpty()}", localVarError.statusCode, localVarResponse) + } + ResponseType.ServerError -> { + val localVarError = localVarResponse as ServerError<*> + throw ServerException("Server error : ${localVarError.statusCode} ${localVarError.message.orEmpty()} ${localVarError.body}", localVarError.statusCode, localVarResponse) + } + } + } + + /** + * + * Get all devices for current user + * @return ApiResponse?> + * @throws IllegalStateException If the request is not correctly configured + * @throws IOException Rethrows the OkHttp execute method exception + */ + @Suppress("UNCHECKED_CAST") + @Throws(IllegalStateException::class, IOException::class) + fun authenticatorsAllListWithHttpInfo() : ApiResponse?> { + val localVariableConfig = authenticatorsAllListRequestConfig() + + return request>( + localVariableConfig + ) + } + + /** + * To obtain the request config of the operation authenticatorsAllList + * + * @return RequestConfig + */ + fun authenticatorsAllListRequestConfig() : RequestConfig { + val localVariableBody = null + val localVariableQuery: MultiValueMap = mutableMapOf() + val localVariableHeaders: MutableMap = mutableMapOf() + localVariableHeaders["Accept"] = "application/json" + + return RequestConfig( + method = RequestMethod.GET, + path = "/authenticators/all/", + query = localVariableQuery, + headers = localVariableHeaders, + requiresAuthentication = true, + body = localVariableBody + ) + } + + /** + * + * Viewset for Duo authenticator devices + * @param id A unique integer value identifying this Duo Device. + * @return void + * @throws IllegalStateException If the request is not correctly configured + * @throws IOException Rethrows the OkHttp execute method exception + * @throws UnsupportedOperationException If the API returns an informational or redirection response + * @throws ClientException If the API returns a client error response + * @throws ServerException If the API returns a server error response + */ + @Throws(IllegalStateException::class, IOException::class, UnsupportedOperationException::class, ClientException::class, ServerException::class) + fun authenticatorsDuoDestroy(id: kotlin.Int) : Unit { + val localVarResponse = authenticatorsDuoDestroyWithHttpInfo(id = id) + + return when (localVarResponse.responseType) { + ResponseType.Success -> Unit + ResponseType.Informational -> throw UnsupportedOperationException("Client does not support Informational responses.") + ResponseType.Redirection -> throw UnsupportedOperationException("Client does not support Redirection responses.") + ResponseType.ClientError -> { + val localVarError = localVarResponse as ClientError<*> + throw ClientException("Client error : ${localVarError.statusCode} ${localVarError.message.orEmpty()}", localVarError.statusCode, localVarResponse) + } + ResponseType.ServerError -> { + val localVarError = localVarResponse as ServerError<*> + throw ServerException("Server error : ${localVarError.statusCode} ${localVarError.message.orEmpty()} ${localVarError.body}", localVarError.statusCode, localVarResponse) + } + } + } + + /** + * + * Viewset for Duo authenticator devices + * @param id A unique integer value identifying this Duo Device. + * @return ApiResponse + * @throws IllegalStateException If the request is not correctly configured + * @throws IOException Rethrows the OkHttp execute method exception + */ + @Throws(IllegalStateException::class, IOException::class) + fun authenticatorsDuoDestroyWithHttpInfo(id: kotlin.Int) : ApiResponse { + val localVariableConfig = authenticatorsDuoDestroyRequestConfig(id = id) + + return request( + localVariableConfig + ) + } + + /** + * To obtain the request config of the operation authenticatorsDuoDestroy + * + * @param id A unique integer value identifying this Duo Device. + * @return RequestConfig + */ + fun authenticatorsDuoDestroyRequestConfig(id: kotlin.Int) : RequestConfig { + val localVariableBody = null + val localVariableQuery: MultiValueMap = mutableMapOf() + val localVariableHeaders: MutableMap = mutableMapOf() + localVariableHeaders["Accept"] = "application/json" + + return RequestConfig( + method = RequestMethod.DELETE, + path = "/authenticators/duo/{id}/".replace("{"+"id"+"}", encodeURIComponent(id.toString())), + query = localVariableQuery, + headers = localVariableHeaders, + requiresAuthentication = true, + body = localVariableBody + ) + } + + /** + * + * Viewset for Duo authenticator devices + * @param name (optional) + * @param ordering Which field to use when ordering the results. (optional) + * @param page A page number within the paginated result set. (optional) + * @param pageSize Number of results to return per page. (optional) + * @param search A search term. (optional) + * @return PaginatedDuoDeviceList + * @throws IllegalStateException If the request is not correctly configured + * @throws IOException Rethrows the OkHttp execute method exception + * @throws UnsupportedOperationException If the API returns an informational or redirection response + * @throws ClientException If the API returns a client error response + * @throws ServerException If the API returns a server error response + */ + @Suppress("UNCHECKED_CAST") + @Throws(IllegalStateException::class, IOException::class, UnsupportedOperationException::class, ClientException::class, ServerException::class) + fun authenticatorsDuoList(name: kotlin.String? = null, ordering: kotlin.String? = null, page: kotlin.Int? = null, pageSize: kotlin.Int? = null, search: kotlin.String? = null) : PaginatedDuoDeviceList { + val localVarResponse = authenticatorsDuoListWithHttpInfo(name = name, ordering = ordering, page = page, pageSize = pageSize, search = search) + + return when (localVarResponse.responseType) { + ResponseType.Success -> (localVarResponse as Success<*>).data as PaginatedDuoDeviceList + ResponseType.Informational -> throw UnsupportedOperationException("Client does not support Informational responses.") + ResponseType.Redirection -> throw UnsupportedOperationException("Client does not support Redirection responses.") + ResponseType.ClientError -> { + val localVarError = localVarResponse as ClientError<*> + throw ClientException("Client error : ${localVarError.statusCode} ${localVarError.message.orEmpty()}", localVarError.statusCode, localVarResponse) + } + ResponseType.ServerError -> { + val localVarError = localVarResponse as ServerError<*> + throw ServerException("Server error : ${localVarError.statusCode} ${localVarError.message.orEmpty()} ${localVarError.body}", localVarError.statusCode, localVarResponse) + } + } + } + + /** + * + * Viewset for Duo authenticator devices + * @param name (optional) + * @param ordering Which field to use when ordering the results. (optional) + * @param page A page number within the paginated result set. (optional) + * @param pageSize Number of results to return per page. (optional) + * @param search A search term. (optional) + * @return ApiResponse + * @throws IllegalStateException If the request is not correctly configured + * @throws IOException Rethrows the OkHttp execute method exception + */ + @Suppress("UNCHECKED_CAST") + @Throws(IllegalStateException::class, IOException::class) + fun authenticatorsDuoListWithHttpInfo(name: kotlin.String?, ordering: kotlin.String?, page: kotlin.Int?, pageSize: kotlin.Int?, search: kotlin.String?) : ApiResponse { + val localVariableConfig = authenticatorsDuoListRequestConfig(name = name, ordering = ordering, page = page, pageSize = pageSize, search = search) + + return request( + localVariableConfig + ) + } + + /** + * To obtain the request config of the operation authenticatorsDuoList + * + * @param name (optional) + * @param ordering Which field to use when ordering the results. (optional) + * @param page A page number within the paginated result set. (optional) + * @param pageSize Number of results to return per page. (optional) + * @param search A search term. (optional) + * @return RequestConfig + */ + fun authenticatorsDuoListRequestConfig(name: kotlin.String?, ordering: kotlin.String?, page: kotlin.Int?, pageSize: kotlin.Int?, search: kotlin.String?) : RequestConfig { + val localVariableBody = null + val localVariableQuery: MultiValueMap = mutableMapOf>() + .apply { + if (name != null) { + put("name", listOf(name.toString())) + } + if (ordering != null) { + put("ordering", listOf(ordering.toString())) + } + if (page != null) { + put("page", listOf(page.toString())) + } + if (pageSize != null) { + put("page_size", listOf(pageSize.toString())) + } + if (search != null) { + put("search", listOf(search.toString())) + } + } + val localVariableHeaders: MutableMap = mutableMapOf() + localVariableHeaders["Accept"] = "application/json" + + return RequestConfig( + method = RequestMethod.GET, + path = "/authenticators/duo/", + query = localVariableQuery, + headers = localVariableHeaders, + requiresAuthentication = true, + body = localVariableBody + ) + } + + /** + * + * Viewset for Duo authenticator devices + * @param id A unique integer value identifying this Duo Device. + * @param patchedDuoDeviceRequest (optional) + * @return DuoDevice + * @throws IllegalStateException If the request is not correctly configured + * @throws IOException Rethrows the OkHttp execute method exception + * @throws UnsupportedOperationException If the API returns an informational or redirection response + * @throws ClientException If the API returns a client error response + * @throws ServerException If the API returns a server error response + */ + @Suppress("UNCHECKED_CAST") + @Throws(IllegalStateException::class, IOException::class, UnsupportedOperationException::class, ClientException::class, ServerException::class) + fun authenticatorsDuoPartialUpdate(id: kotlin.Int, patchedDuoDeviceRequest: PatchedDuoDeviceRequest? = null) : DuoDevice { + val localVarResponse = authenticatorsDuoPartialUpdateWithHttpInfo(id = id, patchedDuoDeviceRequest = patchedDuoDeviceRequest) + + return when (localVarResponse.responseType) { + ResponseType.Success -> (localVarResponse as Success<*>).data as DuoDevice + ResponseType.Informational -> throw UnsupportedOperationException("Client does not support Informational responses.") + ResponseType.Redirection -> throw UnsupportedOperationException("Client does not support Redirection responses.") + ResponseType.ClientError -> { + val localVarError = localVarResponse as ClientError<*> + throw ClientException("Client error : ${localVarError.statusCode} ${localVarError.message.orEmpty()}", localVarError.statusCode, localVarResponse) + } + ResponseType.ServerError -> { + val localVarError = localVarResponse as ServerError<*> + throw ServerException("Server error : ${localVarError.statusCode} ${localVarError.message.orEmpty()} ${localVarError.body}", localVarError.statusCode, localVarResponse) + } + } + } + + /** + * + * Viewset for Duo authenticator devices + * @param id A unique integer value identifying this Duo Device. + * @param patchedDuoDeviceRequest (optional) + * @return ApiResponse + * @throws IllegalStateException If the request is not correctly configured + * @throws IOException Rethrows the OkHttp execute method exception + */ + @Suppress("UNCHECKED_CAST") + @Throws(IllegalStateException::class, IOException::class) + fun authenticatorsDuoPartialUpdateWithHttpInfo(id: kotlin.Int, patchedDuoDeviceRequest: PatchedDuoDeviceRequest?) : ApiResponse { + val localVariableConfig = authenticatorsDuoPartialUpdateRequestConfig(id = id, patchedDuoDeviceRequest = patchedDuoDeviceRequest) + + return request( + localVariableConfig + ) + } + + /** + * To obtain the request config of the operation authenticatorsDuoPartialUpdate + * + * @param id A unique integer value identifying this Duo Device. + * @param patchedDuoDeviceRequest (optional) + * @return RequestConfig + */ + fun authenticatorsDuoPartialUpdateRequestConfig(id: kotlin.Int, patchedDuoDeviceRequest: PatchedDuoDeviceRequest?) : RequestConfig { + val localVariableBody = patchedDuoDeviceRequest + val localVariableQuery: MultiValueMap = mutableMapOf() + val localVariableHeaders: MutableMap = mutableMapOf() + localVariableHeaders["Content-Type"] = "application/json" + localVariableHeaders["Accept"] = "application/json" + + return RequestConfig( + method = RequestMethod.PATCH, + path = "/authenticators/duo/{id}/".replace("{"+"id"+"}", encodeURIComponent(id.toString())), + query = localVariableQuery, + headers = localVariableHeaders, + requiresAuthentication = true, + body = localVariableBody + ) + } + + /** + * + * Viewset for Duo authenticator devices + * @param id A unique integer value identifying this Duo Device. + * @return DuoDevice + * @throws IllegalStateException If the request is not correctly configured + * @throws IOException Rethrows the OkHttp execute method exception + * @throws UnsupportedOperationException If the API returns an informational or redirection response + * @throws ClientException If the API returns a client error response + * @throws ServerException If the API returns a server error response + */ + @Suppress("UNCHECKED_CAST") + @Throws(IllegalStateException::class, IOException::class, UnsupportedOperationException::class, ClientException::class, ServerException::class) + fun authenticatorsDuoRetrieve(id: kotlin.Int) : DuoDevice { + val localVarResponse = authenticatorsDuoRetrieveWithHttpInfo(id = id) + + return when (localVarResponse.responseType) { + ResponseType.Success -> (localVarResponse as Success<*>).data as DuoDevice + ResponseType.Informational -> throw UnsupportedOperationException("Client does not support Informational responses.") + ResponseType.Redirection -> throw UnsupportedOperationException("Client does not support Redirection responses.") + ResponseType.ClientError -> { + val localVarError = localVarResponse as ClientError<*> + throw ClientException("Client error : ${localVarError.statusCode} ${localVarError.message.orEmpty()}", localVarError.statusCode, localVarResponse) + } + ResponseType.ServerError -> { + val localVarError = localVarResponse as ServerError<*> + throw ServerException("Server error : ${localVarError.statusCode} ${localVarError.message.orEmpty()} ${localVarError.body}", localVarError.statusCode, localVarResponse) + } + } + } + + /** + * + * Viewset for Duo authenticator devices + * @param id A unique integer value identifying this Duo Device. + * @return ApiResponse + * @throws IllegalStateException If the request is not correctly configured + * @throws IOException Rethrows the OkHttp execute method exception + */ + @Suppress("UNCHECKED_CAST") + @Throws(IllegalStateException::class, IOException::class) + fun authenticatorsDuoRetrieveWithHttpInfo(id: kotlin.Int) : ApiResponse { + val localVariableConfig = authenticatorsDuoRetrieveRequestConfig(id = id) + + return request( + localVariableConfig + ) + } + + /** + * To obtain the request config of the operation authenticatorsDuoRetrieve + * + * @param id A unique integer value identifying this Duo Device. + * @return RequestConfig + */ + fun authenticatorsDuoRetrieveRequestConfig(id: kotlin.Int) : RequestConfig { + val localVariableBody = null + val localVariableQuery: MultiValueMap = mutableMapOf() + val localVariableHeaders: MutableMap = mutableMapOf() + localVariableHeaders["Accept"] = "application/json" + + return RequestConfig( + method = RequestMethod.GET, + path = "/authenticators/duo/{id}/".replace("{"+"id"+"}", encodeURIComponent(id.toString())), + query = localVariableQuery, + headers = localVariableHeaders, + requiresAuthentication = true, + body = localVariableBody + ) + } + + /** + * + * Viewset for Duo authenticator devices + * @param id A unique integer value identifying this Duo Device. + * @param duoDeviceRequest + * @return DuoDevice + * @throws IllegalStateException If the request is not correctly configured + * @throws IOException Rethrows the OkHttp execute method exception + * @throws UnsupportedOperationException If the API returns an informational or redirection response + * @throws ClientException If the API returns a client error response + * @throws ServerException If the API returns a server error response + */ + @Suppress("UNCHECKED_CAST") + @Throws(IllegalStateException::class, IOException::class, UnsupportedOperationException::class, ClientException::class, ServerException::class) + fun authenticatorsDuoUpdate(id: kotlin.Int, duoDeviceRequest: DuoDeviceRequest) : DuoDevice { + val localVarResponse = authenticatorsDuoUpdateWithHttpInfo(id = id, duoDeviceRequest = duoDeviceRequest) + + return when (localVarResponse.responseType) { + ResponseType.Success -> (localVarResponse as Success<*>).data as DuoDevice + ResponseType.Informational -> throw UnsupportedOperationException("Client does not support Informational responses.") + ResponseType.Redirection -> throw UnsupportedOperationException("Client does not support Redirection responses.") + ResponseType.ClientError -> { + val localVarError = localVarResponse as ClientError<*> + throw ClientException("Client error : ${localVarError.statusCode} ${localVarError.message.orEmpty()}", localVarError.statusCode, localVarResponse) + } + ResponseType.ServerError -> { + val localVarError = localVarResponse as ServerError<*> + throw ServerException("Server error : ${localVarError.statusCode} ${localVarError.message.orEmpty()} ${localVarError.body}", localVarError.statusCode, localVarResponse) + } + } + } + + /** + * + * Viewset for Duo authenticator devices + * @param id A unique integer value identifying this Duo Device. + * @param duoDeviceRequest + * @return ApiResponse + * @throws IllegalStateException If the request is not correctly configured + * @throws IOException Rethrows the OkHttp execute method exception + */ + @Suppress("UNCHECKED_CAST") + @Throws(IllegalStateException::class, IOException::class) + fun authenticatorsDuoUpdateWithHttpInfo(id: kotlin.Int, duoDeviceRequest: DuoDeviceRequest) : ApiResponse { + val localVariableConfig = authenticatorsDuoUpdateRequestConfig(id = id, duoDeviceRequest = duoDeviceRequest) + + return request( + localVariableConfig + ) + } + + /** + * To obtain the request config of the operation authenticatorsDuoUpdate + * + * @param id A unique integer value identifying this Duo Device. + * @param duoDeviceRequest + * @return RequestConfig + */ + fun authenticatorsDuoUpdateRequestConfig(id: kotlin.Int, duoDeviceRequest: DuoDeviceRequest) : RequestConfig { + val localVariableBody = duoDeviceRequest + val localVariableQuery: MultiValueMap = mutableMapOf() + val localVariableHeaders: MutableMap = mutableMapOf() + localVariableHeaders["Content-Type"] = "application/json" + localVariableHeaders["Accept"] = "application/json" + + return RequestConfig( + method = RequestMethod.PUT, + path = "/authenticators/duo/{id}/".replace("{"+"id"+"}", encodeURIComponent(id.toString())), + query = localVariableQuery, + headers = localVariableHeaders, + requiresAuthentication = true, + body = localVariableBody + ) + } + + /** + * + * Get a list of all objects that use this object + * @param id A unique integer value identifying this Duo Device. + * @return kotlin.collections.List + * @throws IllegalStateException If the request is not correctly configured + * @throws IOException Rethrows the OkHttp execute method exception + * @throws UnsupportedOperationException If the API returns an informational or redirection response + * @throws ClientException If the API returns a client error response + * @throws ServerException If the API returns a server error response + */ + @Suppress("UNCHECKED_CAST") + @Throws(IllegalStateException::class, IOException::class, UnsupportedOperationException::class, ClientException::class, ServerException::class) + fun authenticatorsDuoUsedByList(id: kotlin.Int) : kotlin.collections.List { + val localVarResponse = authenticatorsDuoUsedByListWithHttpInfo(id = id) return when (localVarResponse.responseType) { - ResponseType.Success -> (localVarResponse as Success<*>).data as WebAuthnDevice + ResponseType.Success -> (localVarResponse as Success<*>).data as kotlin.collections.List ResponseType.Informational -> throw UnsupportedOperationException("Client does not support Informational responses.") ResponseType.Redirection -> throw UnsupportedOperationException("Client does not support Redirection responses.") ResponseType.ClientError -> { @@ -2267,40 +3416,37 @@ class AuthenticatorsApi(basePath: kotlin.String = defaultBasePath, client: OkHtt /** * - * Viewset for WebAuthn authenticator devices (for admins) - * @param id A unique integer value identifying this WebAuthn Device. - * @param patchedWebAuthnDeviceRequest (optional) - * @return ApiResponse + * Get a list of all objects that use this object + * @param id A unique integer value identifying this Duo Device. + * @return ApiResponse?> * @throws IllegalStateException If the request is not correctly configured * @throws IOException Rethrows the OkHttp execute method exception */ @Suppress("UNCHECKED_CAST") @Throws(IllegalStateException::class, IOException::class) - fun authenticatorsAdminWebauthnPartialUpdateWithHttpInfo(id: kotlin.Int, patchedWebAuthnDeviceRequest: PatchedWebAuthnDeviceRequest?) : ApiResponse { - val localVariableConfig = authenticatorsAdminWebauthnPartialUpdateRequestConfig(id = id, patchedWebAuthnDeviceRequest = patchedWebAuthnDeviceRequest) + fun authenticatorsDuoUsedByListWithHttpInfo(id: kotlin.Int) : ApiResponse?> { + val localVariableConfig = authenticatorsDuoUsedByListRequestConfig(id = id) - return request( + return request>( localVariableConfig ) } /** - * To obtain the request config of the operation authenticatorsAdminWebauthnPartialUpdate + * To obtain the request config of the operation authenticatorsDuoUsedByList * - * @param id A unique integer value identifying this WebAuthn Device. - * @param patchedWebAuthnDeviceRequest (optional) + * @param id A unique integer value identifying this Duo Device. * @return RequestConfig */ - fun authenticatorsAdminWebauthnPartialUpdateRequestConfig(id: kotlin.Int, patchedWebAuthnDeviceRequest: PatchedWebAuthnDeviceRequest?) : RequestConfig { - val localVariableBody = patchedWebAuthnDeviceRequest + fun authenticatorsDuoUsedByListRequestConfig(id: kotlin.Int) : RequestConfig { + val localVariableBody = null val localVariableQuery: MultiValueMap = mutableMapOf() val localVariableHeaders: MutableMap = mutableMapOf() - localVariableHeaders["Content-Type"] = "application/json" localVariableHeaders["Accept"] = "application/json" return RequestConfig( - method = RequestMethod.PATCH, - path = "/authenticators/admin/webauthn/{id}/".replace("{"+"id"+"}", encodeURIComponent(id.toString())), + method = RequestMethod.GET, + path = "/authenticators/duo/{id}/used_by/".replace("{"+"id"+"}", encodeURIComponent(id.toString())), query = localVariableQuery, headers = localVariableHeaders, requiresAuthentication = true, @@ -2310,22 +3456,22 @@ class AuthenticatorsApi(basePath: kotlin.String = defaultBasePath, client: OkHtt /** * - * Viewset for WebAuthn authenticator devices (for admins) - * @param id A unique integer value identifying this WebAuthn Device. - * @return WebAuthnDevice + * Check in data about a device + * @param uuid A UUID string identifying this Mobile Device. + * @param mobileDeviceCheckInRequest + * @return void * @throws IllegalStateException If the request is not correctly configured * @throws IOException Rethrows the OkHttp execute method exception * @throws UnsupportedOperationException If the API returns an informational or redirection response * @throws ClientException If the API returns a client error response * @throws ServerException If the API returns a server error response */ - @Suppress("UNCHECKED_CAST") @Throws(IllegalStateException::class, IOException::class, UnsupportedOperationException::class, ClientException::class, ServerException::class) - fun authenticatorsAdminWebauthnRetrieve(id: kotlin.Int) : WebAuthnDevice { - val localVarResponse = authenticatorsAdminWebauthnRetrieveWithHttpInfo(id = id) + fun authenticatorsMobileCheckInCreate(uuid: java.util.UUID, mobileDeviceCheckInRequest: MobileDeviceCheckInRequest) : Unit { + val localVarResponse = authenticatorsMobileCheckInCreateWithHttpInfo(uuid = uuid, mobileDeviceCheckInRequest = mobileDeviceCheckInRequest) return when (localVarResponse.responseType) { - ResponseType.Success -> (localVarResponse as Success<*>).data as WebAuthnDevice + ResponseType.Success -> Unit ResponseType.Informational -> throw UnsupportedOperationException("Client does not support Informational responses.") ResponseType.Redirection -> throw UnsupportedOperationException("Client does not support Redirection responses.") ResponseType.ClientError -> { @@ -2341,37 +3487,39 @@ class AuthenticatorsApi(basePath: kotlin.String = defaultBasePath, client: OkHtt /** * - * Viewset for WebAuthn authenticator devices (for admins) - * @param id A unique integer value identifying this WebAuthn Device. - * @return ApiResponse + * Check in data about a device + * @param uuid A UUID string identifying this Mobile Device. + * @param mobileDeviceCheckInRequest + * @return ApiResponse * @throws IllegalStateException If the request is not correctly configured * @throws IOException Rethrows the OkHttp execute method exception */ - @Suppress("UNCHECKED_CAST") @Throws(IllegalStateException::class, IOException::class) - fun authenticatorsAdminWebauthnRetrieveWithHttpInfo(id: kotlin.Int) : ApiResponse { - val localVariableConfig = authenticatorsAdminWebauthnRetrieveRequestConfig(id = id) + fun authenticatorsMobileCheckInCreateWithHttpInfo(uuid: java.util.UUID, mobileDeviceCheckInRequest: MobileDeviceCheckInRequest) : ApiResponse { + val localVariableConfig = authenticatorsMobileCheckInCreateRequestConfig(uuid = uuid, mobileDeviceCheckInRequest = mobileDeviceCheckInRequest) - return request( + return request( localVariableConfig ) } /** - * To obtain the request config of the operation authenticatorsAdminWebauthnRetrieve + * To obtain the request config of the operation authenticatorsMobileCheckInCreate * - * @param id A unique integer value identifying this WebAuthn Device. + * @param uuid A UUID string identifying this Mobile Device. + * @param mobileDeviceCheckInRequest * @return RequestConfig */ - fun authenticatorsAdminWebauthnRetrieveRequestConfig(id: kotlin.Int) : RequestConfig { - val localVariableBody = null + fun authenticatorsMobileCheckInCreateRequestConfig(uuid: java.util.UUID, mobileDeviceCheckInRequest: MobileDeviceCheckInRequest) : RequestConfig { + val localVariableBody = mobileDeviceCheckInRequest val localVariableQuery: MultiValueMap = mutableMapOf() val localVariableHeaders: MutableMap = mutableMapOf() + localVariableHeaders["Content-Type"] = "application/json" localVariableHeaders["Accept"] = "application/json" return RequestConfig( - method = RequestMethod.GET, - path = "/authenticators/admin/webauthn/{id}/".replace("{"+"id"+"}", encodeURIComponent(id.toString())), + method = RequestMethod.POST, + path = "/authenticators/mobile/{uuid}/check_in/".replace("{"+"uuid"+"}", encodeURIComponent(uuid.toString())), query = localVariableQuery, headers = localVariableHeaders, requiresAuthentication = true, @@ -2381,23 +3529,21 @@ class AuthenticatorsApi(basePath: kotlin.String = defaultBasePath, client: OkHtt /** * - * Viewset for WebAuthn authenticator devices (for admins) - * @param id A unique integer value identifying this WebAuthn Device. - * @param webAuthnDeviceRequest - * @return WebAuthnDevice + * Viewset for Mobile authenticator devices + * @param uuid A UUID string identifying this Mobile Device. + * @return void * @throws IllegalStateException If the request is not correctly configured * @throws IOException Rethrows the OkHttp execute method exception * @throws UnsupportedOperationException If the API returns an informational or redirection response * @throws ClientException If the API returns a client error response * @throws ServerException If the API returns a server error response */ - @Suppress("UNCHECKED_CAST") @Throws(IllegalStateException::class, IOException::class, UnsupportedOperationException::class, ClientException::class, ServerException::class) - fun authenticatorsAdminWebauthnUpdate(id: kotlin.Int, webAuthnDeviceRequest: WebAuthnDeviceRequest) : WebAuthnDevice { - val localVarResponse = authenticatorsAdminWebauthnUpdateWithHttpInfo(id = id, webAuthnDeviceRequest = webAuthnDeviceRequest) + fun authenticatorsMobileDestroy(uuid: java.util.UUID) : Unit { + val localVarResponse = authenticatorsMobileDestroyWithHttpInfo(uuid = uuid) return when (localVarResponse.responseType) { - ResponseType.Success -> (localVarResponse as Success<*>).data as WebAuthnDevice + ResponseType.Success -> Unit ResponseType.Informational -> throw UnsupportedOperationException("Client does not support Informational responses.") ResponseType.Redirection -> throw UnsupportedOperationException("Client does not support Redirection responses.") ResponseType.ClientError -> { @@ -2413,40 +3559,36 @@ class AuthenticatorsApi(basePath: kotlin.String = defaultBasePath, client: OkHtt /** * - * Viewset for WebAuthn authenticator devices (for admins) - * @param id A unique integer value identifying this WebAuthn Device. - * @param webAuthnDeviceRequest - * @return ApiResponse + * Viewset for Mobile authenticator devices + * @param uuid A UUID string identifying this Mobile Device. + * @return ApiResponse * @throws IllegalStateException If the request is not correctly configured * @throws IOException Rethrows the OkHttp execute method exception */ - @Suppress("UNCHECKED_CAST") @Throws(IllegalStateException::class, IOException::class) - fun authenticatorsAdminWebauthnUpdateWithHttpInfo(id: kotlin.Int, webAuthnDeviceRequest: WebAuthnDeviceRequest) : ApiResponse { - val localVariableConfig = authenticatorsAdminWebauthnUpdateRequestConfig(id = id, webAuthnDeviceRequest = webAuthnDeviceRequest) + fun authenticatorsMobileDestroyWithHttpInfo(uuid: java.util.UUID) : ApiResponse { + val localVariableConfig = authenticatorsMobileDestroyRequestConfig(uuid = uuid) - return request( + return request( localVariableConfig ) } /** - * To obtain the request config of the operation authenticatorsAdminWebauthnUpdate + * To obtain the request config of the operation authenticatorsMobileDestroy * - * @param id A unique integer value identifying this WebAuthn Device. - * @param webAuthnDeviceRequest + * @param uuid A UUID string identifying this Mobile Device. * @return RequestConfig */ - fun authenticatorsAdminWebauthnUpdateRequestConfig(id: kotlin.Int, webAuthnDeviceRequest: WebAuthnDeviceRequest) : RequestConfig { - val localVariableBody = webAuthnDeviceRequest + fun authenticatorsMobileDestroyRequestConfig(uuid: java.util.UUID) : RequestConfig { + val localVariableBody = null val localVariableQuery: MultiValueMap = mutableMapOf() val localVariableHeaders: MutableMap = mutableMapOf() - localVariableHeaders["Content-Type"] = "application/json" localVariableHeaders["Accept"] = "application/json" return RequestConfig( - method = RequestMethod.PUT, - path = "/authenticators/admin/webauthn/{id}/".replace("{"+"id"+"}", encodeURIComponent(id.toString())), + method = RequestMethod.DELETE, + path = "/authenticators/mobile/{uuid}/".replace("{"+"uuid"+"}", encodeURIComponent(uuid.toString())), query = localVariableQuery, headers = localVariableHeaders, requiresAuthentication = true, @@ -2456,8 +3598,10 @@ class AuthenticatorsApi(basePath: kotlin.String = defaultBasePath, client: OkHtt /** * - * Get all devices for current user - * @return kotlin.collections.List + * Enrollment callback + * @param uuid A UUID string identifying this Mobile Device. + * @param mobileDeviceEnrollmentRequest + * @return MobileDeviceEnrollmentCallback * @throws IllegalStateException If the request is not correctly configured * @throws IOException Rethrows the OkHttp execute method exception * @throws UnsupportedOperationException If the API returns an informational or redirection response @@ -2466,11 +3610,11 @@ class AuthenticatorsApi(basePath: kotlin.String = defaultBasePath, client: OkHtt */ @Suppress("UNCHECKED_CAST") @Throws(IllegalStateException::class, IOException::class, UnsupportedOperationException::class, ClientException::class, ServerException::class) - fun authenticatorsAllList() : kotlin.collections.List { - val localVarResponse = authenticatorsAllListWithHttpInfo() + fun authenticatorsMobileEnrollmentCallbackCreate(uuid: java.util.UUID, mobileDeviceEnrollmentRequest: MobileDeviceEnrollmentRequest) : MobileDeviceEnrollmentCallback { + val localVarResponse = authenticatorsMobileEnrollmentCallbackCreateWithHttpInfo(uuid = uuid, mobileDeviceEnrollmentRequest = mobileDeviceEnrollmentRequest) return when (localVarResponse.responseType) { - ResponseType.Success -> (localVarResponse as Success<*>).data as kotlin.collections.List + ResponseType.Success -> (localVarResponse as Success<*>).data as MobileDeviceEnrollmentCallback ResponseType.Informational -> throw UnsupportedOperationException("Client does not support Informational responses.") ResponseType.Redirection -> throw UnsupportedOperationException("Client does not support Redirection responses.") ResponseType.ClientError -> { @@ -2486,35 +3630,40 @@ class AuthenticatorsApi(basePath: kotlin.String = defaultBasePath, client: OkHtt /** * - * Get all devices for current user - * @return ApiResponse?> + * Enrollment callback + * @param uuid A UUID string identifying this Mobile Device. + * @param mobileDeviceEnrollmentRequest + * @return ApiResponse * @throws IllegalStateException If the request is not correctly configured * @throws IOException Rethrows the OkHttp execute method exception */ @Suppress("UNCHECKED_CAST") @Throws(IllegalStateException::class, IOException::class) - fun authenticatorsAllListWithHttpInfo() : ApiResponse?> { - val localVariableConfig = authenticatorsAllListRequestConfig() + fun authenticatorsMobileEnrollmentCallbackCreateWithHttpInfo(uuid: java.util.UUID, mobileDeviceEnrollmentRequest: MobileDeviceEnrollmentRequest) : ApiResponse { + val localVariableConfig = authenticatorsMobileEnrollmentCallbackCreateRequestConfig(uuid = uuid, mobileDeviceEnrollmentRequest = mobileDeviceEnrollmentRequest) - return request>( + return request( localVariableConfig ) } /** - * To obtain the request config of the operation authenticatorsAllList + * To obtain the request config of the operation authenticatorsMobileEnrollmentCallbackCreate * + * @param uuid A UUID string identifying this Mobile Device. + * @param mobileDeviceEnrollmentRequest * @return RequestConfig */ - fun authenticatorsAllListRequestConfig() : RequestConfig { - val localVariableBody = null + fun authenticatorsMobileEnrollmentCallbackCreateRequestConfig(uuid: java.util.UUID, mobileDeviceEnrollmentRequest: MobileDeviceEnrollmentRequest) : RequestConfig { + val localVariableBody = mobileDeviceEnrollmentRequest val localVariableQuery: MultiValueMap = mutableMapOf() val localVariableHeaders: MutableMap = mutableMapOf() + localVariableHeaders["Content-Type"] = "application/json" localVariableHeaders["Accept"] = "application/json" return RequestConfig( - method = RequestMethod.GET, - path = "/authenticators/all/", + method = RequestMethod.POST, + path = "/authenticators/mobile/{uuid}/enrollment_callback/".replace("{"+"uuid"+"}", encodeURIComponent(uuid.toString())), query = localVariableQuery, headers = localVariableHeaders, requiresAuthentication = true, @@ -2524,21 +3673,22 @@ class AuthenticatorsApi(basePath: kotlin.String = defaultBasePath, client: OkHtt /** * - * Viewset for Duo authenticator devices - * @param id A unique integer value identifying this Duo Device. - * @return void + * Check device enrollment status + * @param uuid A UUID string identifying this Mobile Device. + * @return MobileDeviceEnrollmentStatus * @throws IllegalStateException If the request is not correctly configured * @throws IOException Rethrows the OkHttp execute method exception * @throws UnsupportedOperationException If the API returns an informational or redirection response * @throws ClientException If the API returns a client error response * @throws ServerException If the API returns a server error response */ + @Suppress("UNCHECKED_CAST") @Throws(IllegalStateException::class, IOException::class, UnsupportedOperationException::class, ClientException::class, ServerException::class) - fun authenticatorsDuoDestroy(id: kotlin.Int) : Unit { - val localVarResponse = authenticatorsDuoDestroyWithHttpInfo(id = id) + fun authenticatorsMobileEnrollmentStatusCreate(uuid: java.util.UUID) : MobileDeviceEnrollmentStatus { + val localVarResponse = authenticatorsMobileEnrollmentStatusCreateWithHttpInfo(uuid = uuid) return when (localVarResponse.responseType) { - ResponseType.Success -> Unit + ResponseType.Success -> (localVarResponse as Success<*>).data as MobileDeviceEnrollmentStatus ResponseType.Informational -> throw UnsupportedOperationException("Client does not support Informational responses.") ResponseType.Redirection -> throw UnsupportedOperationException("Client does not support Redirection responses.") ResponseType.ClientError -> { @@ -2554,36 +3704,37 @@ class AuthenticatorsApi(basePath: kotlin.String = defaultBasePath, client: OkHtt /** * - * Viewset for Duo authenticator devices - * @param id A unique integer value identifying this Duo Device. - * @return ApiResponse + * Check device enrollment status + * @param uuid A UUID string identifying this Mobile Device. + * @return ApiResponse * @throws IllegalStateException If the request is not correctly configured * @throws IOException Rethrows the OkHttp execute method exception */ + @Suppress("UNCHECKED_CAST") @Throws(IllegalStateException::class, IOException::class) - fun authenticatorsDuoDestroyWithHttpInfo(id: kotlin.Int) : ApiResponse { - val localVariableConfig = authenticatorsDuoDestroyRequestConfig(id = id) + fun authenticatorsMobileEnrollmentStatusCreateWithHttpInfo(uuid: java.util.UUID) : ApiResponse { + val localVariableConfig = authenticatorsMobileEnrollmentStatusCreateRequestConfig(uuid = uuid) - return request( + return request( localVariableConfig ) } /** - * To obtain the request config of the operation authenticatorsDuoDestroy + * To obtain the request config of the operation authenticatorsMobileEnrollmentStatusCreate * - * @param id A unique integer value identifying this Duo Device. + * @param uuid A UUID string identifying this Mobile Device. * @return RequestConfig */ - fun authenticatorsDuoDestroyRequestConfig(id: kotlin.Int) : RequestConfig { + fun authenticatorsMobileEnrollmentStatusCreateRequestConfig(uuid: java.util.UUID) : RequestConfig { val localVariableBody = null val localVariableQuery: MultiValueMap = mutableMapOf() val localVariableHeaders: MutableMap = mutableMapOf() localVariableHeaders["Accept"] = "application/json" return RequestConfig( - method = RequestMethod.DELETE, - path = "/authenticators/duo/{id}/".replace("{"+"id"+"}", encodeURIComponent(id.toString())), + method = RequestMethod.POST, + path = "/authenticators/mobile/{uuid}/enrollment_status/".replace("{"+"uuid"+"}", encodeURIComponent(uuid.toString())), query = localVariableQuery, headers = localVariableHeaders, requiresAuthentication = true, @@ -2593,13 +3744,13 @@ class AuthenticatorsApi(basePath: kotlin.String = defaultBasePath, client: OkHtt /** * - * Viewset for Duo authenticator devices + * Viewset for Mobile authenticator devices * @param name (optional) * @param ordering Which field to use when ordering the results. (optional) * @param page A page number within the paginated result set. (optional) * @param pageSize Number of results to return per page. (optional) * @param search A search term. (optional) - * @return PaginatedDuoDeviceList + * @return PaginatedMobileDeviceList * @throws IllegalStateException If the request is not correctly configured * @throws IOException Rethrows the OkHttp execute method exception * @throws UnsupportedOperationException If the API returns an informational or redirection response @@ -2608,11 +3759,11 @@ class AuthenticatorsApi(basePath: kotlin.String = defaultBasePath, client: OkHtt */ @Suppress("UNCHECKED_CAST") @Throws(IllegalStateException::class, IOException::class, UnsupportedOperationException::class, ClientException::class, ServerException::class) - fun authenticatorsDuoList(name: kotlin.String? = null, ordering: kotlin.String? = null, page: kotlin.Int? = null, pageSize: kotlin.Int? = null, search: kotlin.String? = null) : PaginatedDuoDeviceList { - val localVarResponse = authenticatorsDuoListWithHttpInfo(name = name, ordering = ordering, page = page, pageSize = pageSize, search = search) + fun authenticatorsMobileList(name: kotlin.String? = null, ordering: kotlin.String? = null, page: kotlin.Int? = null, pageSize: kotlin.Int? = null, search: kotlin.String? = null) : PaginatedMobileDeviceList { + val localVarResponse = authenticatorsMobileListWithHttpInfo(name = name, ordering = ordering, page = page, pageSize = pageSize, search = search) return when (localVarResponse.responseType) { - ResponseType.Success -> (localVarResponse as Success<*>).data as PaginatedDuoDeviceList + ResponseType.Success -> (localVarResponse as Success<*>).data as PaginatedMobileDeviceList ResponseType.Informational -> throw UnsupportedOperationException("Client does not support Informational responses.") ResponseType.Redirection -> throw UnsupportedOperationException("Client does not support Redirection responses.") ResponseType.ClientError -> { @@ -2628,28 +3779,28 @@ class AuthenticatorsApi(basePath: kotlin.String = defaultBasePath, client: OkHtt /** * - * Viewset for Duo authenticator devices + * Viewset for Mobile authenticator devices * @param name (optional) * @param ordering Which field to use when ordering the results. (optional) * @param page A page number within the paginated result set. (optional) * @param pageSize Number of results to return per page. (optional) * @param search A search term. (optional) - * @return ApiResponse + * @return ApiResponse * @throws IllegalStateException If the request is not correctly configured * @throws IOException Rethrows the OkHttp execute method exception */ @Suppress("UNCHECKED_CAST") @Throws(IllegalStateException::class, IOException::class) - fun authenticatorsDuoListWithHttpInfo(name: kotlin.String?, ordering: kotlin.String?, page: kotlin.Int?, pageSize: kotlin.Int?, search: kotlin.String?) : ApiResponse { - val localVariableConfig = authenticatorsDuoListRequestConfig(name = name, ordering = ordering, page = page, pageSize = pageSize, search = search) + fun authenticatorsMobileListWithHttpInfo(name: kotlin.String?, ordering: kotlin.String?, page: kotlin.Int?, pageSize: kotlin.Int?, search: kotlin.String?) : ApiResponse { + val localVariableConfig = authenticatorsMobileListRequestConfig(name = name, ordering = ordering, page = page, pageSize = pageSize, search = search) - return request( + return request( localVariableConfig ) } /** - * To obtain the request config of the operation authenticatorsDuoList + * To obtain the request config of the operation authenticatorsMobileList * * @param name (optional) * @param ordering Which field to use when ordering the results. (optional) @@ -2658,7 +3809,7 @@ class AuthenticatorsApi(basePath: kotlin.String = defaultBasePath, client: OkHtt * @param search A search term. (optional) * @return RequestConfig */ - fun authenticatorsDuoListRequestConfig(name: kotlin.String?, ordering: kotlin.String?, page: kotlin.Int?, pageSize: kotlin.Int?, search: kotlin.String?) : RequestConfig { + fun authenticatorsMobileListRequestConfig(name: kotlin.String?, ordering: kotlin.String?, page: kotlin.Int?, pageSize: kotlin.Int?, search: kotlin.String?) : RequestConfig { val localVariableBody = null val localVariableQuery: MultiValueMap = mutableMapOf>() .apply { @@ -2683,7 +3834,7 @@ class AuthenticatorsApi(basePath: kotlin.String = defaultBasePath, client: OkHtt return RequestConfig( method = RequestMethod.GET, - path = "/authenticators/duo/", + path = "/authenticators/mobile/", query = localVariableQuery, headers = localVariableHeaders, requiresAuthentication = true, @@ -2693,10 +3844,10 @@ class AuthenticatorsApi(basePath: kotlin.String = defaultBasePath, client: OkHtt /** * - * Viewset for Duo authenticator devices - * @param id A unique integer value identifying this Duo Device. - * @param patchedDuoDeviceRequest (optional) - * @return DuoDevice + * Viewset for Mobile authenticator devices + * @param uuid A UUID string identifying this Mobile Device. + * @param patchedMobileDeviceRequest (optional) + * @return MobileDevice * @throws IllegalStateException If the request is not correctly configured * @throws IOException Rethrows the OkHttp execute method exception * @throws UnsupportedOperationException If the API returns an informational or redirection response @@ -2705,11 +3856,11 @@ class AuthenticatorsApi(basePath: kotlin.String = defaultBasePath, client: OkHtt */ @Suppress("UNCHECKED_CAST") @Throws(IllegalStateException::class, IOException::class, UnsupportedOperationException::class, ClientException::class, ServerException::class) - fun authenticatorsDuoPartialUpdate(id: kotlin.Int, patchedDuoDeviceRequest: PatchedDuoDeviceRequest? = null) : DuoDevice { - val localVarResponse = authenticatorsDuoPartialUpdateWithHttpInfo(id = id, patchedDuoDeviceRequest = patchedDuoDeviceRequest) + fun authenticatorsMobilePartialUpdate(uuid: java.util.UUID, patchedMobileDeviceRequest: PatchedMobileDeviceRequest? = null) : MobileDevice { + val localVarResponse = authenticatorsMobilePartialUpdateWithHttpInfo(uuid = uuid, patchedMobileDeviceRequest = patchedMobileDeviceRequest) return when (localVarResponse.responseType) { - ResponseType.Success -> (localVarResponse as Success<*>).data as DuoDevice + ResponseType.Success -> (localVarResponse as Success<*>).data as MobileDevice ResponseType.Informational -> throw UnsupportedOperationException("Client does not support Informational responses.") ResponseType.Redirection -> throw UnsupportedOperationException("Client does not support Redirection responses.") ResponseType.ClientError -> { @@ -2725,32 +3876,32 @@ class AuthenticatorsApi(basePath: kotlin.String = defaultBasePath, client: OkHtt /** * - * Viewset for Duo authenticator devices - * @param id A unique integer value identifying this Duo Device. - * @param patchedDuoDeviceRequest (optional) - * @return ApiResponse + * Viewset for Mobile authenticator devices + * @param uuid A UUID string identifying this Mobile Device. + * @param patchedMobileDeviceRequest (optional) + * @return ApiResponse * @throws IllegalStateException If the request is not correctly configured * @throws IOException Rethrows the OkHttp execute method exception */ @Suppress("UNCHECKED_CAST") @Throws(IllegalStateException::class, IOException::class) - fun authenticatorsDuoPartialUpdateWithHttpInfo(id: kotlin.Int, patchedDuoDeviceRequest: PatchedDuoDeviceRequest?) : ApiResponse { - val localVariableConfig = authenticatorsDuoPartialUpdateRequestConfig(id = id, patchedDuoDeviceRequest = patchedDuoDeviceRequest) + fun authenticatorsMobilePartialUpdateWithHttpInfo(uuid: java.util.UUID, patchedMobileDeviceRequest: PatchedMobileDeviceRequest?) : ApiResponse { + val localVariableConfig = authenticatorsMobilePartialUpdateRequestConfig(uuid = uuid, patchedMobileDeviceRequest = patchedMobileDeviceRequest) - return request( + return request( localVariableConfig ) } /** - * To obtain the request config of the operation authenticatorsDuoPartialUpdate + * To obtain the request config of the operation authenticatorsMobilePartialUpdate * - * @param id A unique integer value identifying this Duo Device. - * @param patchedDuoDeviceRequest (optional) + * @param uuid A UUID string identifying this Mobile Device. + * @param patchedMobileDeviceRequest (optional) * @return RequestConfig */ - fun authenticatorsDuoPartialUpdateRequestConfig(id: kotlin.Int, patchedDuoDeviceRequest: PatchedDuoDeviceRequest?) : RequestConfig { - val localVariableBody = patchedDuoDeviceRequest + fun authenticatorsMobilePartialUpdateRequestConfig(uuid: java.util.UUID, patchedMobileDeviceRequest: PatchedMobileDeviceRequest?) : RequestConfig { + val localVariableBody = patchedMobileDeviceRequest val localVariableQuery: MultiValueMap = mutableMapOf() val localVariableHeaders: MutableMap = mutableMapOf() localVariableHeaders["Content-Type"] = "application/json" @@ -2758,7 +3909,7 @@ class AuthenticatorsApi(basePath: kotlin.String = defaultBasePath, client: OkHtt return RequestConfig( method = RequestMethod.PATCH, - path = "/authenticators/duo/{id}/".replace("{"+"id"+"}", encodeURIComponent(id.toString())), + path = "/authenticators/mobile/{uuid}/".replace("{"+"uuid"+"}", encodeURIComponent(uuid.toString())), query = localVariableQuery, headers = localVariableHeaders, requiresAuthentication = true, @@ -2768,9 +3919,82 @@ class AuthenticatorsApi(basePath: kotlin.String = defaultBasePath, client: OkHtt /** * - * Viewset for Duo authenticator devices - * @param id A unique integer value identifying this Duo Device. - * @return DuoDevice + * Get response from notification on phone + * @param uuid A UUID string identifying this Mobile Device. + * @param mobileDeviceResponseRequest + * @return void + * @throws IllegalStateException If the request is not correctly configured + * @throws IOException Rethrows the OkHttp execute method exception + * @throws UnsupportedOperationException If the API returns an informational or redirection response + * @throws ClientException If the API returns a client error response + * @throws ServerException If the API returns a server error response + */ + @Throws(IllegalStateException::class, IOException::class, UnsupportedOperationException::class, ClientException::class, ServerException::class) + fun authenticatorsMobileReceiveResponseCreate(uuid: java.util.UUID, mobileDeviceResponseRequest: MobileDeviceResponseRequest) : Unit { + val localVarResponse = authenticatorsMobileReceiveResponseCreateWithHttpInfo(uuid = uuid, mobileDeviceResponseRequest = mobileDeviceResponseRequest) + + return when (localVarResponse.responseType) { + ResponseType.Success -> Unit + ResponseType.Informational -> throw UnsupportedOperationException("Client does not support Informational responses.") + ResponseType.Redirection -> throw UnsupportedOperationException("Client does not support Redirection responses.") + ResponseType.ClientError -> { + val localVarError = localVarResponse as ClientError<*> + throw ClientException("Client error : ${localVarError.statusCode} ${localVarError.message.orEmpty()}", localVarError.statusCode, localVarResponse) + } + ResponseType.ServerError -> { + val localVarError = localVarResponse as ServerError<*> + throw ServerException("Server error : ${localVarError.statusCode} ${localVarError.message.orEmpty()} ${localVarError.body}", localVarError.statusCode, localVarResponse) + } + } + } + + /** + * + * Get response from notification on phone + * @param uuid A UUID string identifying this Mobile Device. + * @param mobileDeviceResponseRequest + * @return ApiResponse + * @throws IllegalStateException If the request is not correctly configured + * @throws IOException Rethrows the OkHttp execute method exception + */ + @Throws(IllegalStateException::class, IOException::class) + fun authenticatorsMobileReceiveResponseCreateWithHttpInfo(uuid: java.util.UUID, mobileDeviceResponseRequest: MobileDeviceResponseRequest) : ApiResponse { + val localVariableConfig = authenticatorsMobileReceiveResponseCreateRequestConfig(uuid = uuid, mobileDeviceResponseRequest = mobileDeviceResponseRequest) + + return request( + localVariableConfig + ) + } + + /** + * To obtain the request config of the operation authenticatorsMobileReceiveResponseCreate + * + * @param uuid A UUID string identifying this Mobile Device. + * @param mobileDeviceResponseRequest + * @return RequestConfig + */ + fun authenticatorsMobileReceiveResponseCreateRequestConfig(uuid: java.util.UUID, mobileDeviceResponseRequest: MobileDeviceResponseRequest) : RequestConfig { + val localVariableBody = mobileDeviceResponseRequest + val localVariableQuery: MultiValueMap = mutableMapOf() + val localVariableHeaders: MutableMap = mutableMapOf() + localVariableHeaders["Content-Type"] = "application/json" + localVariableHeaders["Accept"] = "application/json" + + return RequestConfig( + method = RequestMethod.POST, + path = "/authenticators/mobile/{uuid}/receive_response/".replace("{"+"uuid"+"}", encodeURIComponent(uuid.toString())), + query = localVariableQuery, + headers = localVariableHeaders, + requiresAuthentication = true, + body = localVariableBody + ) + } + + /** + * + * Viewset for Mobile authenticator devices + * @param uuid A UUID string identifying this Mobile Device. + * @return MobileDevice * @throws IllegalStateException If the request is not correctly configured * @throws IOException Rethrows the OkHttp execute method exception * @throws UnsupportedOperationException If the API returns an informational or redirection response @@ -2779,11 +4003,11 @@ class AuthenticatorsApi(basePath: kotlin.String = defaultBasePath, client: OkHtt */ @Suppress("UNCHECKED_CAST") @Throws(IllegalStateException::class, IOException::class, UnsupportedOperationException::class, ClientException::class, ServerException::class) - fun authenticatorsDuoRetrieve(id: kotlin.Int) : DuoDevice { - val localVarResponse = authenticatorsDuoRetrieveWithHttpInfo(id = id) + fun authenticatorsMobileRetrieve(uuid: java.util.UUID) : MobileDevice { + val localVarResponse = authenticatorsMobileRetrieveWithHttpInfo(uuid = uuid) return when (localVarResponse.responseType) { - ResponseType.Success -> (localVarResponse as Success<*>).data as DuoDevice + ResponseType.Success -> (localVarResponse as Success<*>).data as MobileDevice ResponseType.Informational -> throw UnsupportedOperationException("Client does not support Informational responses.") ResponseType.Redirection -> throw UnsupportedOperationException("Client does not support Redirection responses.") ResponseType.ClientError -> { @@ -2799,29 +4023,29 @@ class AuthenticatorsApi(basePath: kotlin.String = defaultBasePath, client: OkHtt /** * - * Viewset for Duo authenticator devices - * @param id A unique integer value identifying this Duo Device. - * @return ApiResponse + * Viewset for Mobile authenticator devices + * @param uuid A UUID string identifying this Mobile Device. + * @return ApiResponse * @throws IllegalStateException If the request is not correctly configured * @throws IOException Rethrows the OkHttp execute method exception */ @Suppress("UNCHECKED_CAST") @Throws(IllegalStateException::class, IOException::class) - fun authenticatorsDuoRetrieveWithHttpInfo(id: kotlin.Int) : ApiResponse { - val localVariableConfig = authenticatorsDuoRetrieveRequestConfig(id = id) + fun authenticatorsMobileRetrieveWithHttpInfo(uuid: java.util.UUID) : ApiResponse { + val localVariableConfig = authenticatorsMobileRetrieveRequestConfig(uuid = uuid) - return request( + return request( localVariableConfig ) } /** - * To obtain the request config of the operation authenticatorsDuoRetrieve + * To obtain the request config of the operation authenticatorsMobileRetrieve * - * @param id A unique integer value identifying this Duo Device. + * @param uuid A UUID string identifying this Mobile Device. * @return RequestConfig */ - fun authenticatorsDuoRetrieveRequestConfig(id: kotlin.Int) : RequestConfig { + fun authenticatorsMobileRetrieveRequestConfig(uuid: java.util.UUID) : RequestConfig { val localVariableBody = null val localVariableQuery: MultiValueMap = mutableMapOf() val localVariableHeaders: MutableMap = mutableMapOf() @@ -2829,7 +4053,7 @@ class AuthenticatorsApi(basePath: kotlin.String = defaultBasePath, client: OkHtt return RequestConfig( method = RequestMethod.GET, - path = "/authenticators/duo/{id}/".replace("{"+"id"+"}", encodeURIComponent(id.toString())), + path = "/authenticators/mobile/{uuid}/".replace("{"+"uuid"+"}", encodeURIComponent(uuid.toString())), query = localVariableQuery, headers = localVariableHeaders, requiresAuthentication = true, @@ -2839,10 +4063,10 @@ class AuthenticatorsApi(basePath: kotlin.String = defaultBasePath, client: OkHtt /** * - * Viewset for Duo authenticator devices - * @param id A unique integer value identifying this Duo Device. - * @param duoDeviceRequest - * @return DuoDevice + * Viewset for Mobile authenticator devices + * @param uuid A UUID string identifying this Mobile Device. + * @param mobileDeviceRequest + * @return MobileDevice * @throws IllegalStateException If the request is not correctly configured * @throws IOException Rethrows the OkHttp execute method exception * @throws UnsupportedOperationException If the API returns an informational or redirection response @@ -2851,11 +4075,11 @@ class AuthenticatorsApi(basePath: kotlin.String = defaultBasePath, client: OkHtt */ @Suppress("UNCHECKED_CAST") @Throws(IllegalStateException::class, IOException::class, UnsupportedOperationException::class, ClientException::class, ServerException::class) - fun authenticatorsDuoUpdate(id: kotlin.Int, duoDeviceRequest: DuoDeviceRequest) : DuoDevice { - val localVarResponse = authenticatorsDuoUpdateWithHttpInfo(id = id, duoDeviceRequest = duoDeviceRequest) + fun authenticatorsMobileUpdate(uuid: java.util.UUID, mobileDeviceRequest: MobileDeviceRequest) : MobileDevice { + val localVarResponse = authenticatorsMobileUpdateWithHttpInfo(uuid = uuid, mobileDeviceRequest = mobileDeviceRequest) return when (localVarResponse.responseType) { - ResponseType.Success -> (localVarResponse as Success<*>).data as DuoDevice + ResponseType.Success -> (localVarResponse as Success<*>).data as MobileDevice ResponseType.Informational -> throw UnsupportedOperationException("Client does not support Informational responses.") ResponseType.Redirection -> throw UnsupportedOperationException("Client does not support Redirection responses.") ResponseType.ClientError -> { @@ -2871,32 +4095,32 @@ class AuthenticatorsApi(basePath: kotlin.String = defaultBasePath, client: OkHtt /** * - * Viewset for Duo authenticator devices - * @param id A unique integer value identifying this Duo Device. - * @param duoDeviceRequest - * @return ApiResponse + * Viewset for Mobile authenticator devices + * @param uuid A UUID string identifying this Mobile Device. + * @param mobileDeviceRequest + * @return ApiResponse * @throws IllegalStateException If the request is not correctly configured * @throws IOException Rethrows the OkHttp execute method exception */ @Suppress("UNCHECKED_CAST") @Throws(IllegalStateException::class, IOException::class) - fun authenticatorsDuoUpdateWithHttpInfo(id: kotlin.Int, duoDeviceRequest: DuoDeviceRequest) : ApiResponse { - val localVariableConfig = authenticatorsDuoUpdateRequestConfig(id = id, duoDeviceRequest = duoDeviceRequest) + fun authenticatorsMobileUpdateWithHttpInfo(uuid: java.util.UUID, mobileDeviceRequest: MobileDeviceRequest) : ApiResponse { + val localVariableConfig = authenticatorsMobileUpdateRequestConfig(uuid = uuid, mobileDeviceRequest = mobileDeviceRequest) - return request( + return request( localVariableConfig ) } /** - * To obtain the request config of the operation authenticatorsDuoUpdate + * To obtain the request config of the operation authenticatorsMobileUpdate * - * @param id A unique integer value identifying this Duo Device. - * @param duoDeviceRequest + * @param uuid A UUID string identifying this Mobile Device. + * @param mobileDeviceRequest * @return RequestConfig */ - fun authenticatorsDuoUpdateRequestConfig(id: kotlin.Int, duoDeviceRequest: DuoDeviceRequest) : RequestConfig { - val localVariableBody = duoDeviceRequest + fun authenticatorsMobileUpdateRequestConfig(uuid: java.util.UUID, mobileDeviceRequest: MobileDeviceRequest) : RequestConfig { + val localVariableBody = mobileDeviceRequest val localVariableQuery: MultiValueMap = mutableMapOf() val localVariableHeaders: MutableMap = mutableMapOf() localVariableHeaders["Content-Type"] = "application/json" @@ -2904,7 +4128,7 @@ class AuthenticatorsApi(basePath: kotlin.String = defaultBasePath, client: OkHtt return RequestConfig( method = RequestMethod.PUT, - path = "/authenticators/duo/{id}/".replace("{"+"id"+"}", encodeURIComponent(id.toString())), + path = "/authenticators/mobile/{uuid}/".replace("{"+"uuid"+"}", encodeURIComponent(uuid.toString())), query = localVariableQuery, headers = localVariableHeaders, requiresAuthentication = true, @@ -2915,7 +4139,7 @@ class AuthenticatorsApi(basePath: kotlin.String = defaultBasePath, client: OkHtt /** * * Get a list of all objects that use this object - * @param id A unique integer value identifying this Duo Device. + * @param uuid A UUID string identifying this Mobile Device. * @return kotlin.collections.List * @throws IllegalStateException If the request is not correctly configured * @throws IOException Rethrows the OkHttp execute method exception @@ -2925,8 +4149,8 @@ class AuthenticatorsApi(basePath: kotlin.String = defaultBasePath, client: OkHtt */ @Suppress("UNCHECKED_CAST") @Throws(IllegalStateException::class, IOException::class, UnsupportedOperationException::class, ClientException::class, ServerException::class) - fun authenticatorsDuoUsedByList(id: kotlin.Int) : kotlin.collections.List { - val localVarResponse = authenticatorsDuoUsedByListWithHttpInfo(id = id) + fun authenticatorsMobileUsedByList(uuid: java.util.UUID) : kotlin.collections.List { + val localVarResponse = authenticatorsMobileUsedByListWithHttpInfo(uuid = uuid) return when (localVarResponse.responseType) { ResponseType.Success -> (localVarResponse as Success<*>).data as kotlin.collections.List @@ -2946,15 +4170,15 @@ class AuthenticatorsApi(basePath: kotlin.String = defaultBasePath, client: OkHtt /** * * Get a list of all objects that use this object - * @param id A unique integer value identifying this Duo Device. + * @param uuid A UUID string identifying this Mobile Device. * @return ApiResponse?> * @throws IllegalStateException If the request is not correctly configured * @throws IOException Rethrows the OkHttp execute method exception */ @Suppress("UNCHECKED_CAST") @Throws(IllegalStateException::class, IOException::class) - fun authenticatorsDuoUsedByListWithHttpInfo(id: kotlin.Int) : ApiResponse?> { - val localVariableConfig = authenticatorsDuoUsedByListRequestConfig(id = id) + fun authenticatorsMobileUsedByListWithHttpInfo(uuid: java.util.UUID) : ApiResponse?> { + val localVariableConfig = authenticatorsMobileUsedByListRequestConfig(uuid = uuid) return request>( localVariableConfig @@ -2962,12 +4186,12 @@ class AuthenticatorsApi(basePath: kotlin.String = defaultBasePath, client: OkHtt } /** - * To obtain the request config of the operation authenticatorsDuoUsedByList + * To obtain the request config of the operation authenticatorsMobileUsedByList * - * @param id A unique integer value identifying this Duo Device. + * @param uuid A UUID string identifying this Mobile Device. * @return RequestConfig */ - fun authenticatorsDuoUsedByListRequestConfig(id: kotlin.Int) : RequestConfig { + fun authenticatorsMobileUsedByListRequestConfig(uuid: java.util.UUID) : RequestConfig { val localVariableBody = null val localVariableQuery: MultiValueMap = mutableMapOf() val localVariableHeaders: MutableMap = mutableMapOf() @@ -2975,7 +4199,7 @@ class AuthenticatorsApi(basePath: kotlin.String = defaultBasePath, client: OkHtt return RequestConfig( method = RequestMethod.GET, - path = "/authenticators/duo/{id}/used_by/".replace("{"+"id"+"}", encodeURIComponent(id.toString())), + path = "/authenticators/mobile/{uuid}/used_by/".replace("{"+"uuid"+"}", encodeURIComponent(uuid.toString())), query = localVariableQuery, headers = localVariableHeaders, requiresAuthentication = true, diff --git a/src/main/kotlin/io/goauthentik/api/apis/CoreApi.kt b/src/main/kotlin/io/goauthentik/api/apis/CoreApi.kt index cf8e0c3..caa6227 100644 --- a/src/main/kotlin/io/goauthentik/api/apis/CoreApi.kt +++ b/src/main/kotlin/io/goauthentik/api/apis/CoreApi.kt @@ -310,6 +310,7 @@ class CoreApi(basePath: kotlin.String = defaultBasePath, client: OkHttpClient = /** * * Custom list method that checks Policy based access instead of guardian + * @param forUser (optional) * @param group (optional) * @param metaDescription (optional) * @param metaLaunchUrl (optional) @@ -330,8 +331,8 @@ class CoreApi(basePath: kotlin.String = defaultBasePath, client: OkHttpClient = */ @Suppress("UNCHECKED_CAST") @Throws(IllegalStateException::class, IOException::class, UnsupportedOperationException::class, ClientException::class, ServerException::class) - fun coreApplicationsList(group: kotlin.String? = null, metaDescription: kotlin.String? = null, metaLaunchUrl: kotlin.String? = null, metaPublisher: kotlin.String? = null, name: kotlin.String? = null, ordering: kotlin.String? = null, page: kotlin.Int? = null, pageSize: kotlin.Int? = null, search: kotlin.String? = null, slug: kotlin.String? = null, superuserFullList: kotlin.Boolean? = null) : PaginatedApplicationList { - val localVarResponse = coreApplicationsListWithHttpInfo(group = group, metaDescription = metaDescription, metaLaunchUrl = metaLaunchUrl, metaPublisher = metaPublisher, name = name, ordering = ordering, page = page, pageSize = pageSize, search = search, slug = slug, superuserFullList = superuserFullList) + fun coreApplicationsList(forUser: kotlin.Int? = null, group: kotlin.String? = null, metaDescription: kotlin.String? = null, metaLaunchUrl: kotlin.String? = null, metaPublisher: kotlin.String? = null, name: kotlin.String? = null, ordering: kotlin.String? = null, page: kotlin.Int? = null, pageSize: kotlin.Int? = null, search: kotlin.String? = null, slug: kotlin.String? = null, superuserFullList: kotlin.Boolean? = null) : PaginatedApplicationList { + val localVarResponse = coreApplicationsListWithHttpInfo(forUser = forUser, group = group, metaDescription = metaDescription, metaLaunchUrl = metaLaunchUrl, metaPublisher = metaPublisher, name = name, ordering = ordering, page = page, pageSize = pageSize, search = search, slug = slug, superuserFullList = superuserFullList) return when (localVarResponse.responseType) { ResponseType.Success -> (localVarResponse as Success<*>).data as PaginatedApplicationList @@ -351,6 +352,7 @@ class CoreApi(basePath: kotlin.String = defaultBasePath, client: OkHttpClient = /** * * Custom list method that checks Policy based access instead of guardian + * @param forUser (optional) * @param group (optional) * @param metaDescription (optional) * @param metaLaunchUrl (optional) @@ -368,8 +370,8 @@ class CoreApi(basePath: kotlin.String = defaultBasePath, client: OkHttpClient = */ @Suppress("UNCHECKED_CAST") @Throws(IllegalStateException::class, IOException::class) - fun coreApplicationsListWithHttpInfo(group: kotlin.String?, metaDescription: kotlin.String?, metaLaunchUrl: kotlin.String?, metaPublisher: kotlin.String?, name: kotlin.String?, ordering: kotlin.String?, page: kotlin.Int?, pageSize: kotlin.Int?, search: kotlin.String?, slug: kotlin.String?, superuserFullList: kotlin.Boolean?) : ApiResponse { - val localVariableConfig = coreApplicationsListRequestConfig(group = group, metaDescription = metaDescription, metaLaunchUrl = metaLaunchUrl, metaPublisher = metaPublisher, name = name, ordering = ordering, page = page, pageSize = pageSize, search = search, slug = slug, superuserFullList = superuserFullList) + fun coreApplicationsListWithHttpInfo(forUser: kotlin.Int?, group: kotlin.String?, metaDescription: kotlin.String?, metaLaunchUrl: kotlin.String?, metaPublisher: kotlin.String?, name: kotlin.String?, ordering: kotlin.String?, page: kotlin.Int?, pageSize: kotlin.Int?, search: kotlin.String?, slug: kotlin.String?, superuserFullList: kotlin.Boolean?) : ApiResponse { + val localVariableConfig = coreApplicationsListRequestConfig(forUser = forUser, group = group, metaDescription = metaDescription, metaLaunchUrl = metaLaunchUrl, metaPublisher = metaPublisher, name = name, ordering = ordering, page = page, pageSize = pageSize, search = search, slug = slug, superuserFullList = superuserFullList) return request( localVariableConfig @@ -379,6 +381,7 @@ class CoreApi(basePath: kotlin.String = defaultBasePath, client: OkHttpClient = /** * To obtain the request config of the operation coreApplicationsList * + * @param forUser (optional) * @param group (optional) * @param metaDescription (optional) * @param metaLaunchUrl (optional) @@ -392,10 +395,13 @@ class CoreApi(basePath: kotlin.String = defaultBasePath, client: OkHttpClient = * @param superuserFullList (optional) * @return RequestConfig */ - fun coreApplicationsListRequestConfig(group: kotlin.String?, metaDescription: kotlin.String?, metaLaunchUrl: kotlin.String?, metaPublisher: kotlin.String?, name: kotlin.String?, ordering: kotlin.String?, page: kotlin.Int?, pageSize: kotlin.Int?, search: kotlin.String?, slug: kotlin.String?, superuserFullList: kotlin.Boolean?) : RequestConfig { + fun coreApplicationsListRequestConfig(forUser: kotlin.Int?, group: kotlin.String?, metaDescription: kotlin.String?, metaLaunchUrl: kotlin.String?, metaPublisher: kotlin.String?, name: kotlin.String?, ordering: kotlin.String?, page: kotlin.Int?, pageSize: kotlin.Int?, search: kotlin.String?, slug: kotlin.String?, superuserFullList: kotlin.Boolean?) : RequestConfig { val localVariableBody = null val localVariableQuery: MultiValueMap = mutableMapOf>() .apply { + if (forUser != null) { + put("for_user", listOf(forUser.toString())) + } if (group != null) { put("group", listOf(group.toString())) } diff --git a/src/main/kotlin/io/goauthentik/api/apis/EventsApi.kt b/src/main/kotlin/io/goauthentik/api/apis/EventsApi.kt index 9bbcd7f..58adee4 100644 --- a/src/main/kotlin/io/goauthentik/api/apis/EventsApi.kt +++ b/src/main/kotlin/io/goauthentik/api/apis/EventsApi.kt @@ -35,10 +35,12 @@ import io.goauthentik.api.models.PaginatedEventList import io.goauthentik.api.models.PaginatedNotificationList import io.goauthentik.api.models.PaginatedNotificationRuleList import io.goauthentik.api.models.PaginatedNotificationTransportList +import io.goauthentik.api.models.PaginatedSystemTaskList import io.goauthentik.api.models.PatchedEventRequest import io.goauthentik.api.models.PatchedNotificationRequest import io.goauthentik.api.models.PatchedNotificationRuleRequest import io.goauthentik.api.models.PatchedNotificationTransportRequest +import io.goauthentik.api.models.SystemTask import io.goauthentik.api.models.TypeCreate import io.goauthentik.api.models.UsedBy import io.goauthentik.api.models.ValidationError @@ -2053,6 +2055,268 @@ class EventsApi(basePath: kotlin.String = defaultBasePath, client: OkHttpClient ) } + /** + * enum for parameter status + */ + enum class StatusEventsSystemTasksList(val value: kotlin.String) { + @Json(name = "error") error("error"), + @Json(name = "successful") successful("successful"), + @Json(name = "unknown") unknown("unknown"), + @Json(name = "warning") warning("warning"), + } + + /** + * + * Read-only view set that returns all background tasks + * @param name (optional) + * @param ordering Which field to use when ordering the results. (optional) + * @param page A page number within the paginated result set. (optional) + * @param pageSize Number of results to return per page. (optional) + * @param search A search term. (optional) + * @param status * `unknown` - Unknown * `successful` - Successful * `warning` - Warning * `error` - Error (optional) + * @param uid (optional) + * @return PaginatedSystemTaskList + * @throws IllegalStateException If the request is not correctly configured + * @throws IOException Rethrows the OkHttp execute method exception + * @throws UnsupportedOperationException If the API returns an informational or redirection response + * @throws ClientException If the API returns a client error response + * @throws ServerException If the API returns a server error response + */ + @Suppress("UNCHECKED_CAST") + @Throws(IllegalStateException::class, IOException::class, UnsupportedOperationException::class, ClientException::class, ServerException::class) + fun eventsSystemTasksList(name: kotlin.String? = null, ordering: kotlin.String? = null, page: kotlin.Int? = null, pageSize: kotlin.Int? = null, search: kotlin.String? = null, status: StatusEventsSystemTasksList? = null, uid: kotlin.String? = null) : PaginatedSystemTaskList { + val localVarResponse = eventsSystemTasksListWithHttpInfo(name = name, ordering = ordering, page = page, pageSize = pageSize, search = search, status = status, uid = uid) + + return when (localVarResponse.responseType) { + ResponseType.Success -> (localVarResponse as Success<*>).data as PaginatedSystemTaskList + ResponseType.Informational -> throw UnsupportedOperationException("Client does not support Informational responses.") + ResponseType.Redirection -> throw UnsupportedOperationException("Client does not support Redirection responses.") + ResponseType.ClientError -> { + val localVarError = localVarResponse as ClientError<*> + throw ClientException("Client error : ${localVarError.statusCode} ${localVarError.message.orEmpty()}", localVarError.statusCode, localVarResponse) + } + ResponseType.ServerError -> { + val localVarError = localVarResponse as ServerError<*> + throw ServerException("Server error : ${localVarError.statusCode} ${localVarError.message.orEmpty()} ${localVarError.body}", localVarError.statusCode, localVarResponse) + } + } + } + + /** + * + * Read-only view set that returns all background tasks + * @param name (optional) + * @param ordering Which field to use when ordering the results. (optional) + * @param page A page number within the paginated result set. (optional) + * @param pageSize Number of results to return per page. (optional) + * @param search A search term. (optional) + * @param status * `unknown` - Unknown * `successful` - Successful * `warning` - Warning * `error` - Error (optional) + * @param uid (optional) + * @return ApiResponse + * @throws IllegalStateException If the request is not correctly configured + * @throws IOException Rethrows the OkHttp execute method exception + */ + @Suppress("UNCHECKED_CAST") + @Throws(IllegalStateException::class, IOException::class) + fun eventsSystemTasksListWithHttpInfo(name: kotlin.String?, ordering: kotlin.String?, page: kotlin.Int?, pageSize: kotlin.Int?, search: kotlin.String?, status: StatusEventsSystemTasksList?, uid: kotlin.String?) : ApiResponse { + val localVariableConfig = eventsSystemTasksListRequestConfig(name = name, ordering = ordering, page = page, pageSize = pageSize, search = search, status = status, uid = uid) + + return request( + localVariableConfig + ) + } + + /** + * To obtain the request config of the operation eventsSystemTasksList + * + * @param name (optional) + * @param ordering Which field to use when ordering the results. (optional) + * @param page A page number within the paginated result set. (optional) + * @param pageSize Number of results to return per page. (optional) + * @param search A search term. (optional) + * @param status * `unknown` - Unknown * `successful` - Successful * `warning` - Warning * `error` - Error (optional) + * @param uid (optional) + * @return RequestConfig + */ + fun eventsSystemTasksListRequestConfig(name: kotlin.String?, ordering: kotlin.String?, page: kotlin.Int?, pageSize: kotlin.Int?, search: kotlin.String?, status: StatusEventsSystemTasksList?, uid: kotlin.String?) : RequestConfig { + val localVariableBody = null + val localVariableQuery: MultiValueMap = mutableMapOf>() + .apply { + if (name != null) { + put("name", listOf(name.toString())) + } + if (ordering != null) { + put("ordering", listOf(ordering.toString())) + } + if (page != null) { + put("page", listOf(page.toString())) + } + if (pageSize != null) { + put("page_size", listOf(pageSize.toString())) + } + if (search != null) { + put("search", listOf(search.toString())) + } + if (status != null) { + put("status", listOf(status.value)) + } + if (uid != null) { + put("uid", listOf(uid.toString())) + } + } + val localVariableHeaders: MutableMap = mutableMapOf() + localVariableHeaders["Accept"] = "application/json" + + return RequestConfig( + method = RequestMethod.GET, + path = "/events/system_tasks/", + query = localVariableQuery, + headers = localVariableHeaders, + requiresAuthentication = true, + body = localVariableBody + ) + } + + /** + * + * Read-only view set that returns all background tasks + * @param uuid A UUID string identifying this System Task. + * @return SystemTask + * @throws IllegalStateException If the request is not correctly configured + * @throws IOException Rethrows the OkHttp execute method exception + * @throws UnsupportedOperationException If the API returns an informational or redirection response + * @throws ClientException If the API returns a client error response + * @throws ServerException If the API returns a server error response + */ + @Suppress("UNCHECKED_CAST") + @Throws(IllegalStateException::class, IOException::class, UnsupportedOperationException::class, ClientException::class, ServerException::class) + fun eventsSystemTasksRetrieve(uuid: java.util.UUID) : SystemTask { + val localVarResponse = eventsSystemTasksRetrieveWithHttpInfo(uuid = uuid) + + return when (localVarResponse.responseType) { + ResponseType.Success -> (localVarResponse as Success<*>).data as SystemTask + ResponseType.Informational -> throw UnsupportedOperationException("Client does not support Informational responses.") + ResponseType.Redirection -> throw UnsupportedOperationException("Client does not support Redirection responses.") + ResponseType.ClientError -> { + val localVarError = localVarResponse as ClientError<*> + throw ClientException("Client error : ${localVarError.statusCode} ${localVarError.message.orEmpty()}", localVarError.statusCode, localVarResponse) + } + ResponseType.ServerError -> { + val localVarError = localVarResponse as ServerError<*> + throw ServerException("Server error : ${localVarError.statusCode} ${localVarError.message.orEmpty()} ${localVarError.body}", localVarError.statusCode, localVarResponse) + } + } + } + + /** + * + * Read-only view set that returns all background tasks + * @param uuid A UUID string identifying this System Task. + * @return ApiResponse + * @throws IllegalStateException If the request is not correctly configured + * @throws IOException Rethrows the OkHttp execute method exception + */ + @Suppress("UNCHECKED_CAST") + @Throws(IllegalStateException::class, IOException::class) + fun eventsSystemTasksRetrieveWithHttpInfo(uuid: java.util.UUID) : ApiResponse { + val localVariableConfig = eventsSystemTasksRetrieveRequestConfig(uuid = uuid) + + return request( + localVariableConfig + ) + } + + /** + * To obtain the request config of the operation eventsSystemTasksRetrieve + * + * @param uuid A UUID string identifying this System Task. + * @return RequestConfig + */ + fun eventsSystemTasksRetrieveRequestConfig(uuid: java.util.UUID) : RequestConfig { + val localVariableBody = null + val localVariableQuery: MultiValueMap = mutableMapOf() + val localVariableHeaders: MutableMap = mutableMapOf() + localVariableHeaders["Accept"] = "application/json" + + return RequestConfig( + method = RequestMethod.GET, + path = "/events/system_tasks/{uuid}/".replace("{"+"uuid"+"}", encodeURIComponent(uuid.toString())), + query = localVariableQuery, + headers = localVariableHeaders, + requiresAuthentication = true, + body = localVariableBody + ) + } + + /** + * + * Run task + * @param uuid A UUID string identifying this System Task. + * @return void + * @throws IllegalStateException If the request is not correctly configured + * @throws IOException Rethrows the OkHttp execute method exception + * @throws UnsupportedOperationException If the API returns an informational or redirection response + * @throws ClientException If the API returns a client error response + * @throws ServerException If the API returns a server error response + */ + @Throws(IllegalStateException::class, IOException::class, UnsupportedOperationException::class, ClientException::class, ServerException::class) + fun eventsSystemTasksRunCreate(uuid: java.util.UUID) : Unit { + val localVarResponse = eventsSystemTasksRunCreateWithHttpInfo(uuid = uuid) + + return when (localVarResponse.responseType) { + ResponseType.Success -> Unit + ResponseType.Informational -> throw UnsupportedOperationException("Client does not support Informational responses.") + ResponseType.Redirection -> throw UnsupportedOperationException("Client does not support Redirection responses.") + ResponseType.ClientError -> { + val localVarError = localVarResponse as ClientError<*> + throw ClientException("Client error : ${localVarError.statusCode} ${localVarError.message.orEmpty()}", localVarError.statusCode, localVarResponse) + } + ResponseType.ServerError -> { + val localVarError = localVarResponse as ServerError<*> + throw ServerException("Server error : ${localVarError.statusCode} ${localVarError.message.orEmpty()} ${localVarError.body}", localVarError.statusCode, localVarResponse) + } + } + } + + /** + * + * Run task + * @param uuid A UUID string identifying this System Task. + * @return ApiResponse + * @throws IllegalStateException If the request is not correctly configured + * @throws IOException Rethrows the OkHttp execute method exception + */ + @Throws(IllegalStateException::class, IOException::class) + fun eventsSystemTasksRunCreateWithHttpInfo(uuid: java.util.UUID) : ApiResponse { + val localVariableConfig = eventsSystemTasksRunCreateRequestConfig(uuid = uuid) + + return request( + localVariableConfig + ) + } + + /** + * To obtain the request config of the operation eventsSystemTasksRunCreate + * + * @param uuid A UUID string identifying this System Task. + * @return RequestConfig + */ + fun eventsSystemTasksRunCreateRequestConfig(uuid: java.util.UUID) : RequestConfig { + val localVariableBody = null + val localVariableQuery: MultiValueMap = mutableMapOf() + val localVariableHeaders: MutableMap = mutableMapOf() + localVariableHeaders["Accept"] = "application/json" + + return RequestConfig( + method = RequestMethod.POST, + path = "/events/system_tasks/{uuid}/run/".replace("{"+"uuid"+"}", encodeURIComponent(uuid.toString())), + query = localVariableQuery, + headers = localVariableHeaders, + requiresAuthentication = true, + body = localVariableBody + ) + } + /** * * NotificationTransport Viewset diff --git a/src/main/kotlin/io/goauthentik/api/apis/ProvidersApi.kt b/src/main/kotlin/io/goauthentik/api/apis/ProvidersApi.kt index 2eeecc6..e5cecc0 100644 --- a/src/main/kotlin/io/goauthentik/api/apis/ProvidersApi.kt +++ b/src/main/kotlin/io/goauthentik/api/apis/ProvidersApi.kt @@ -1486,6 +1486,7 @@ class ProvidersApi(basePath: kotlin.String = defaultBasePath, client: OkHttpClie * * Preview user data for provider * @param id A unique integer value identifying this OAuth2/OpenID Provider. + * @param forUser (optional) * @return PropertyMappingPreview * @throws IllegalStateException If the request is not correctly configured * @throws IOException Rethrows the OkHttp execute method exception @@ -1495,8 +1496,8 @@ class ProvidersApi(basePath: kotlin.String = defaultBasePath, client: OkHttpClie */ @Suppress("UNCHECKED_CAST") @Throws(IllegalStateException::class, IOException::class, UnsupportedOperationException::class, ClientException::class, ServerException::class) - fun providersOauth2PreviewUserRetrieve(id: kotlin.Int) : PropertyMappingPreview { - val localVarResponse = providersOauth2PreviewUserRetrieveWithHttpInfo(id = id) + fun providersOauth2PreviewUserRetrieve(id: kotlin.Int, forUser: kotlin.Int? = null) : PropertyMappingPreview { + val localVarResponse = providersOauth2PreviewUserRetrieveWithHttpInfo(id = id, forUser = forUser) return when (localVarResponse.responseType) { ResponseType.Success -> (localVarResponse as Success<*>).data as PropertyMappingPreview @@ -1517,14 +1518,15 @@ class ProvidersApi(basePath: kotlin.String = defaultBasePath, client: OkHttpClie * * Preview user data for provider * @param id A unique integer value identifying this OAuth2/OpenID Provider. + * @param forUser (optional) * @return ApiResponse * @throws IllegalStateException If the request is not correctly configured * @throws IOException Rethrows the OkHttp execute method exception */ @Suppress("UNCHECKED_CAST") @Throws(IllegalStateException::class, IOException::class) - fun providersOauth2PreviewUserRetrieveWithHttpInfo(id: kotlin.Int) : ApiResponse { - val localVariableConfig = providersOauth2PreviewUserRetrieveRequestConfig(id = id) + fun providersOauth2PreviewUserRetrieveWithHttpInfo(id: kotlin.Int, forUser: kotlin.Int?) : ApiResponse { + val localVariableConfig = providersOauth2PreviewUserRetrieveRequestConfig(id = id, forUser = forUser) return request( localVariableConfig @@ -1535,11 +1537,17 @@ class ProvidersApi(basePath: kotlin.String = defaultBasePath, client: OkHttpClie * To obtain the request config of the operation providersOauth2PreviewUserRetrieve * * @param id A unique integer value identifying this OAuth2/OpenID Provider. + * @param forUser (optional) * @return RequestConfig */ - fun providersOauth2PreviewUserRetrieveRequestConfig(id: kotlin.Int) : RequestConfig { + fun providersOauth2PreviewUserRetrieveRequestConfig(id: kotlin.Int, forUser: kotlin.Int?) : RequestConfig { val localVariableBody = null - val localVariableQuery: MultiValueMap = mutableMapOf() + val localVariableQuery: MultiValueMap = mutableMapOf>() + .apply { + if (forUser != null) { + put("for_user", listOf(forUser.toString())) + } + } val localVariableHeaders: MutableMap = mutableMapOf() localVariableHeaders["Accept"] = "application/json" @@ -4182,6 +4190,7 @@ class ProvidersApi(basePath: kotlin.String = defaultBasePath, client: OkHttpClie * * Preview user data for provider * @param id A unique integer value identifying this SAML Provider. + * @param forUser (optional) * @return PropertyMappingPreview * @throws IllegalStateException If the request is not correctly configured * @throws IOException Rethrows the OkHttp execute method exception @@ -4191,8 +4200,8 @@ class ProvidersApi(basePath: kotlin.String = defaultBasePath, client: OkHttpClie */ @Suppress("UNCHECKED_CAST") @Throws(IllegalStateException::class, IOException::class, UnsupportedOperationException::class, ClientException::class, ServerException::class) - fun providersSamlPreviewUserRetrieve(id: kotlin.Int) : PropertyMappingPreview { - val localVarResponse = providersSamlPreviewUserRetrieveWithHttpInfo(id = id) + fun providersSamlPreviewUserRetrieve(id: kotlin.Int, forUser: kotlin.Int? = null) : PropertyMappingPreview { + val localVarResponse = providersSamlPreviewUserRetrieveWithHttpInfo(id = id, forUser = forUser) return when (localVarResponse.responseType) { ResponseType.Success -> (localVarResponse as Success<*>).data as PropertyMappingPreview @@ -4213,14 +4222,15 @@ class ProvidersApi(basePath: kotlin.String = defaultBasePath, client: OkHttpClie * * Preview user data for provider * @param id A unique integer value identifying this SAML Provider. + * @param forUser (optional) * @return ApiResponse * @throws IllegalStateException If the request is not correctly configured * @throws IOException Rethrows the OkHttp execute method exception */ @Suppress("UNCHECKED_CAST") @Throws(IllegalStateException::class, IOException::class) - fun providersSamlPreviewUserRetrieveWithHttpInfo(id: kotlin.Int) : ApiResponse { - val localVariableConfig = providersSamlPreviewUserRetrieveRequestConfig(id = id) + fun providersSamlPreviewUserRetrieveWithHttpInfo(id: kotlin.Int, forUser: kotlin.Int?) : ApiResponse { + val localVariableConfig = providersSamlPreviewUserRetrieveRequestConfig(id = id, forUser = forUser) return request( localVariableConfig @@ -4231,11 +4241,17 @@ class ProvidersApi(basePath: kotlin.String = defaultBasePath, client: OkHttpClie * To obtain the request config of the operation providersSamlPreviewUserRetrieve * * @param id A unique integer value identifying this SAML Provider. + * @param forUser (optional) * @return RequestConfig */ - fun providersSamlPreviewUserRetrieveRequestConfig(id: kotlin.Int) : RequestConfig { + fun providersSamlPreviewUserRetrieveRequestConfig(id: kotlin.Int, forUser: kotlin.Int?) : RequestConfig { val localVariableBody = null - val localVariableQuery: MultiValueMap = mutableMapOf() + val localVariableQuery: MultiValueMap = mutableMapOf>() + .apply { + if (forUser != null) { + put("for_user", listOf(forUser.toString())) + } + } val localVariableHeaders: MutableMap = mutableMapOf() localVariableHeaders["Accept"] = "application/json" diff --git a/src/main/kotlin/io/goauthentik/api/apis/RbacApi.kt b/src/main/kotlin/io/goauthentik/api/apis/RbacApi.kt index 76590e1..ea36e30 100644 --- a/src/main/kotlin/io/goauthentik/api/apis/RbacApi.kt +++ b/src/main/kotlin/io/goauthentik/api/apis/RbacApi.kt @@ -160,13 +160,9 @@ class RbacApi(basePath: kotlin.String = defaultBasePath, client: OkHttpClient = @Json(name = "authentik_policies_expiry.passwordexpirypolicy") policiesExpiryPeriodPasswordexpirypolicy("authentik_policies_expiry.passwordexpirypolicy"), @Json(name = "authentik_policies_expression.expressionpolicy") policiesExpressionPeriodExpressionpolicy("authentik_policies_expression.expressionpolicy"), @Json(name = "authentik_policies_password.passwordpolicy") policiesPasswordPeriodPasswordpolicy("authentik_policies_password.passwordpolicy"), - @Json(name = "authentik_policies_reputation.reputation") policiesReputationPeriodReputation("authentik_policies_reputation.reputation"), @Json(name = "authentik_policies_reputation.reputationpolicy") policiesReputationPeriodReputationpolicy("authentik_policies_reputation.reputationpolicy"), @Json(name = "authentik_providers_ldap.ldapprovider") providersLdapPeriodLdapprovider("authentik_providers_ldap.ldapprovider"), - @Json(name = "authentik_providers_oauth2.accesstoken") providersOauth2PeriodAccesstoken("authentik_providers_oauth2.accesstoken"), - @Json(name = "authentik_providers_oauth2.authorizationcode") providersOauth2PeriodAuthorizationcode("authentik_providers_oauth2.authorizationcode"), @Json(name = "authentik_providers_oauth2.oauth2provider") providersOauth2PeriodOauth2provider("authentik_providers_oauth2.oauth2provider"), - @Json(name = "authentik_providers_oauth2.refreshtoken") providersOauth2PeriodRefreshtoken("authentik_providers_oauth2.refreshtoken"), @Json(name = "authentik_providers_oauth2.scopemapping") providersOauth2PeriodScopemapping("authentik_providers_oauth2.scopemapping"), @Json(name = "authentik_providers_proxy.proxyprovider") providersProxyPeriodProxyprovider("authentik_providers_proxy.proxyprovider"), @Json(name = "authentik_providers_rac.endpoint") providersRacPeriodEndpoint("authentik_providers_rac.endpoint"), @@ -188,6 +184,8 @@ class RbacApi(basePath: kotlin.String = defaultBasePath, client: OkHttpClient = @Json(name = "authentik_sources_saml.usersamlsourceconnection") sourcesSamlPeriodUsersamlsourceconnection("authentik_sources_saml.usersamlsourceconnection"), @Json(name = "authentik_stages_authenticator_duo.authenticatorduostage") stagesAuthenticatorDuoPeriodAuthenticatorduostage("authentik_stages_authenticator_duo.authenticatorduostage"), @Json(name = "authentik_stages_authenticator_duo.duodevice") stagesAuthenticatorDuoPeriodDuodevice("authentik_stages_authenticator_duo.duodevice"), + @Json(name = "authentik_stages_authenticator_mobile.authenticatormobilestage") stagesAuthenticatorMobilePeriodAuthenticatormobilestage("authentik_stages_authenticator_mobile.authenticatormobilestage"), + @Json(name = "authentik_stages_authenticator_mobile.mobiledevice") stagesAuthenticatorMobilePeriodMobiledevice("authentik_stages_authenticator_mobile.mobiledevice"), @Json(name = "authentik_stages_authenticator_sms.authenticatorsmsstage") stagesAuthenticatorSmsPeriodAuthenticatorsmsstage("authentik_stages_authenticator_sms.authenticatorsmsstage"), @Json(name = "authentik_stages_authenticator_sms.smsdevice") stagesAuthenticatorSmsPeriodSmsdevice("authentik_stages_authenticator_sms.smsdevice"), @Json(name = "authentik_stages_authenticator_static.authenticatorstaticstage") stagesAuthenticatorStaticPeriodAuthenticatorstaticstage("authentik_stages_authenticator_static.authenticatorstaticstage"), @@ -219,7 +217,7 @@ class RbacApi(basePath: kotlin.String = defaultBasePath, client: OkHttpClient = /** * * Get assigned object permissions for a single object - * @param model * `authentik_tenants.domain` - Domain * `authentik_crypto.certificatekeypair` - Certificate-Key Pair * `authentik_events.event` - Event * `authentik_events.notificationtransport` - Notification Transport * `authentik_events.notification` - Notification * `authentik_events.notificationrule` - Notification Rule * `authentik_events.notificationwebhookmapping` - Webhook Mapping * `authentik_flows.flow` - Flow * `authentik_flows.flowstagebinding` - Flow Stage Binding * `authentik_outposts.dockerserviceconnection` - Docker Service-Connection * `authentik_outposts.kubernetesserviceconnection` - Kubernetes Service-Connection * `authentik_outposts.outpost` - Outpost * `authentik_policies_dummy.dummypolicy` - Dummy Policy * `authentik_policies_event_matcher.eventmatcherpolicy` - Event Matcher Policy * `authentik_policies_expiry.passwordexpirypolicy` - Password Expiry Policy * `authentik_policies_expression.expressionpolicy` - Expression Policy * `authentik_policies_password.passwordpolicy` - Password Policy * `authentik_policies_reputation.reputationpolicy` - Reputation Policy * `authentik_policies_reputation.reputation` - Reputation Score * `authentik_policies.policybinding` - Policy Binding * `authentik_providers_ldap.ldapprovider` - LDAP Provider * `authentik_providers_oauth2.scopemapping` - Scope Mapping * `authentik_providers_oauth2.oauth2provider` - OAuth2/OpenID Provider * `authentik_providers_oauth2.authorizationcode` - Authorization Code * `authentik_providers_oauth2.accesstoken` - OAuth2 Access Token * `authentik_providers_oauth2.refreshtoken` - OAuth2 Refresh Token * `authentik_providers_proxy.proxyprovider` - Proxy Provider * `authentik_providers_radius.radiusprovider` - Radius Provider * `authentik_providers_saml.samlprovider` - SAML Provider * `authentik_providers_saml.samlpropertymapping` - SAML Property Mapping * `authentik_providers_scim.scimprovider` - SCIM Provider * `authentik_providers_scim.scimmapping` - SCIM Mapping * `authentik_rbac.role` - Role * `authentik_sources_ldap.ldapsource` - LDAP Source * `authentik_sources_ldap.ldappropertymapping` - LDAP Property Mapping * `authentik_sources_oauth.oauthsource` - OAuth Source * `authentik_sources_oauth.useroauthsourceconnection` - User OAuth Source Connection * `authentik_sources_plex.plexsource` - Plex Source * `authentik_sources_plex.plexsourceconnection` - User Plex Source Connection * `authentik_sources_saml.samlsource` - SAML Source * `authentik_sources_saml.usersamlsourceconnection` - User SAML Source Connection * `authentik_stages_authenticator_duo.authenticatorduostage` - Duo Authenticator Setup Stage * `authentik_stages_authenticator_duo.duodevice` - Duo Device * `authentik_stages_authenticator_sms.authenticatorsmsstage` - SMS Authenticator Setup Stage * `authentik_stages_authenticator_sms.smsdevice` - SMS Device * `authentik_stages_authenticator_static.authenticatorstaticstage` - Static Authenticator Stage * `authentik_stages_authenticator_static.staticdevice` - Static Device * `authentik_stages_authenticator_totp.authenticatortotpstage` - TOTP Authenticator Setup Stage * `authentik_stages_authenticator_totp.totpdevice` - TOTP Device * `authentik_stages_authenticator_validate.authenticatorvalidatestage` - Authenticator Validation Stage * `authentik_stages_authenticator_webauthn.authenticatewebauthnstage` - WebAuthn Authenticator Setup Stage * `authentik_stages_authenticator_webauthn.webauthndevice` - WebAuthn Device * `authentik_stages_captcha.captchastage` - Captcha Stage * `authentik_stages_consent.consentstage` - Consent Stage * `authentik_stages_consent.userconsent` - User Consent * `authentik_stages_deny.denystage` - Deny Stage * `authentik_stages_dummy.dummystage` - Dummy Stage * `authentik_stages_email.emailstage` - Email Stage * `authentik_stages_identification.identificationstage` - Identification Stage * `authentik_stages_invitation.invitationstage` - Invitation Stage * `authentik_stages_invitation.invitation` - Invitation * `authentik_stages_password.passwordstage` - Password Stage * `authentik_stages_prompt.prompt` - Prompt * `authentik_stages_prompt.promptstage` - Prompt Stage * `authentik_stages_user_delete.userdeletestage` - User Delete Stage * `authentik_stages_user_login.userloginstage` - User Login Stage * `authentik_stages_user_logout.userlogoutstage` - User Logout Stage * `authentik_stages_user_write.userwritestage` - User Write Stage * `authentik_brands.brand` - Brand * `authentik_blueprints.blueprintinstance` - Blueprint Instance * `authentik_core.group` - Group * `authentik_core.user` - User * `authentik_core.application` - Application * `authentik_core.token` - Token * `authentik_enterprise.license` - License * `authentik_providers_rac.racprovider` - RAC Provider * `authentik_providers_rac.endpoint` - RAC Endpoint * `authentik_providers_rac.racpropertymapping` - RAC Property Mapping + * @param model * `authentik_tenants.domain` - Domain * `authentik_crypto.certificatekeypair` - Certificate-Key Pair * `authentik_events.event` - Event * `authentik_events.notificationtransport` - Notification Transport * `authentik_events.notification` - Notification * `authentik_events.notificationrule` - Notification Rule * `authentik_events.notificationwebhookmapping` - Webhook Mapping * `authentik_flows.flow` - Flow * `authentik_flows.flowstagebinding` - Flow Stage Binding * `authentik_outposts.dockerserviceconnection` - Docker Service-Connection * `authentik_outposts.kubernetesserviceconnection` - Kubernetes Service-Connection * `authentik_outposts.outpost` - Outpost * `authentik_policies_dummy.dummypolicy` - Dummy Policy * `authentik_policies_event_matcher.eventmatcherpolicy` - Event Matcher Policy * `authentik_policies_expiry.passwordexpirypolicy` - Password Expiry Policy * `authentik_policies_expression.expressionpolicy` - Expression Policy * `authentik_policies_password.passwordpolicy` - Password Policy * `authentik_policies_reputation.reputationpolicy` - Reputation Policy * `authentik_policies.policybinding` - Policy Binding * `authentik_providers_ldap.ldapprovider` - LDAP Provider * `authentik_providers_oauth2.scopemapping` - Scope Mapping * `authentik_providers_oauth2.oauth2provider` - OAuth2/OpenID Provider * `authentik_providers_proxy.proxyprovider` - Proxy Provider * `authentik_providers_radius.radiusprovider` - Radius Provider * `authentik_providers_saml.samlprovider` - SAML Provider * `authentik_providers_saml.samlpropertymapping` - SAML Property Mapping * `authentik_providers_scim.scimprovider` - SCIM Provider * `authentik_providers_scim.scimmapping` - SCIM Mapping * `authentik_rbac.role` - Role * `authentik_sources_ldap.ldapsource` - LDAP Source * `authentik_sources_ldap.ldappropertymapping` - LDAP Property Mapping * `authentik_sources_oauth.oauthsource` - OAuth Source * `authentik_sources_oauth.useroauthsourceconnection` - User OAuth Source Connection * `authentik_sources_plex.plexsource` - Plex Source * `authentik_sources_plex.plexsourceconnection` - User Plex Source Connection * `authentik_sources_saml.samlsource` - SAML Source * `authentik_sources_saml.usersamlsourceconnection` - User SAML Source Connection * `authentik_stages_authenticator_duo.authenticatorduostage` - Duo Authenticator Setup Stage * `authentik_stages_authenticator_duo.duodevice` - Duo Device * `authentik_stages_authenticator_mobile.authenticatormobilestage` - Mobile Authenticator Setup Stage * `authentik_stages_authenticator_mobile.mobiledevice` - Mobile Device * `authentik_stages_authenticator_sms.authenticatorsmsstage` - SMS Authenticator Setup Stage * `authentik_stages_authenticator_sms.smsdevice` - SMS Device * `authentik_stages_authenticator_static.authenticatorstaticstage` - Static Authenticator Setup Stage * `authentik_stages_authenticator_static.staticdevice` - Static Device * `authentik_stages_authenticator_totp.authenticatortotpstage` - TOTP Authenticator Setup Stage * `authentik_stages_authenticator_totp.totpdevice` - TOTP Device * `authentik_stages_authenticator_validate.authenticatorvalidatestage` - Authenticator Validation Stage * `authentik_stages_authenticator_webauthn.authenticatewebauthnstage` - WebAuthn Authenticator Setup Stage * `authentik_stages_authenticator_webauthn.webauthndevice` - WebAuthn Device * `authentik_stages_captcha.captchastage` - Captcha Stage * `authentik_stages_consent.consentstage` - Consent Stage * `authentik_stages_consent.userconsent` - User Consent * `authentik_stages_deny.denystage` - Deny Stage * `authentik_stages_dummy.dummystage` - Dummy Stage * `authentik_stages_email.emailstage` - Email Stage * `authentik_stages_identification.identificationstage` - Identification Stage * `authentik_stages_invitation.invitationstage` - Invitation Stage * `authentik_stages_invitation.invitation` - Invitation * `authentik_stages_password.passwordstage` - Password Stage * `authentik_stages_prompt.prompt` - Prompt * `authentik_stages_prompt.promptstage` - Prompt Stage * `authentik_stages_user_delete.userdeletestage` - User Delete Stage * `authentik_stages_user_login.userloginstage` - User Login Stage * `authentik_stages_user_logout.userlogoutstage` - User Logout Stage * `authentik_stages_user_write.userwritestage` - User Write Stage * `authentik_brands.brand` - Brand * `authentik_blueprints.blueprintinstance` - Blueprint Instance * `authentik_core.group` - Group * `authentik_core.user` - User * `authentik_core.application` - Application * `authentik_core.token` - Token * `authentik_enterprise.license` - License * `authentik_providers_rac.racprovider` - RAC Provider * `authentik_providers_rac.endpoint` - RAC Endpoint * `authentik_providers_rac.racpropertymapping` - RAC Property Mapping * @param objectPk (optional) * @param ordering Which field to use when ordering the results. (optional) * @param page A page number within the paginated result set. (optional) @@ -255,7 +253,7 @@ class RbacApi(basePath: kotlin.String = defaultBasePath, client: OkHttpClient = /** * * Get assigned object permissions for a single object - * @param model * `authentik_tenants.domain` - Domain * `authentik_crypto.certificatekeypair` - Certificate-Key Pair * `authentik_events.event` - Event * `authentik_events.notificationtransport` - Notification Transport * `authentik_events.notification` - Notification * `authentik_events.notificationrule` - Notification Rule * `authentik_events.notificationwebhookmapping` - Webhook Mapping * `authentik_flows.flow` - Flow * `authentik_flows.flowstagebinding` - Flow Stage Binding * `authentik_outposts.dockerserviceconnection` - Docker Service-Connection * `authentik_outposts.kubernetesserviceconnection` - Kubernetes Service-Connection * `authentik_outposts.outpost` - Outpost * `authentik_policies_dummy.dummypolicy` - Dummy Policy * `authentik_policies_event_matcher.eventmatcherpolicy` - Event Matcher Policy * `authentik_policies_expiry.passwordexpirypolicy` - Password Expiry Policy * `authentik_policies_expression.expressionpolicy` - Expression Policy * `authentik_policies_password.passwordpolicy` - Password Policy * `authentik_policies_reputation.reputationpolicy` - Reputation Policy * `authentik_policies_reputation.reputation` - Reputation Score * `authentik_policies.policybinding` - Policy Binding * `authentik_providers_ldap.ldapprovider` - LDAP Provider * `authentik_providers_oauth2.scopemapping` - Scope Mapping * `authentik_providers_oauth2.oauth2provider` - OAuth2/OpenID Provider * `authentik_providers_oauth2.authorizationcode` - Authorization Code * `authentik_providers_oauth2.accesstoken` - OAuth2 Access Token * `authentik_providers_oauth2.refreshtoken` - OAuth2 Refresh Token * `authentik_providers_proxy.proxyprovider` - Proxy Provider * `authentik_providers_radius.radiusprovider` - Radius Provider * `authentik_providers_saml.samlprovider` - SAML Provider * `authentik_providers_saml.samlpropertymapping` - SAML Property Mapping * `authentik_providers_scim.scimprovider` - SCIM Provider * `authentik_providers_scim.scimmapping` - SCIM Mapping * `authentik_rbac.role` - Role * `authentik_sources_ldap.ldapsource` - LDAP Source * `authentik_sources_ldap.ldappropertymapping` - LDAP Property Mapping * `authentik_sources_oauth.oauthsource` - OAuth Source * `authentik_sources_oauth.useroauthsourceconnection` - User OAuth Source Connection * `authentik_sources_plex.plexsource` - Plex Source * `authentik_sources_plex.plexsourceconnection` - User Plex Source Connection * `authentik_sources_saml.samlsource` - SAML Source * `authentik_sources_saml.usersamlsourceconnection` - User SAML Source Connection * `authentik_stages_authenticator_duo.authenticatorduostage` - Duo Authenticator Setup Stage * `authentik_stages_authenticator_duo.duodevice` - Duo Device * `authentik_stages_authenticator_sms.authenticatorsmsstage` - SMS Authenticator Setup Stage * `authentik_stages_authenticator_sms.smsdevice` - SMS Device * `authentik_stages_authenticator_static.authenticatorstaticstage` - Static Authenticator Stage * `authentik_stages_authenticator_static.staticdevice` - Static Device * `authentik_stages_authenticator_totp.authenticatortotpstage` - TOTP Authenticator Setup Stage * `authentik_stages_authenticator_totp.totpdevice` - TOTP Device * `authentik_stages_authenticator_validate.authenticatorvalidatestage` - Authenticator Validation Stage * `authentik_stages_authenticator_webauthn.authenticatewebauthnstage` - WebAuthn Authenticator Setup Stage * `authentik_stages_authenticator_webauthn.webauthndevice` - WebAuthn Device * `authentik_stages_captcha.captchastage` - Captcha Stage * `authentik_stages_consent.consentstage` - Consent Stage * `authentik_stages_consent.userconsent` - User Consent * `authentik_stages_deny.denystage` - Deny Stage * `authentik_stages_dummy.dummystage` - Dummy Stage * `authentik_stages_email.emailstage` - Email Stage * `authentik_stages_identification.identificationstage` - Identification Stage * `authentik_stages_invitation.invitationstage` - Invitation Stage * `authentik_stages_invitation.invitation` - Invitation * `authentik_stages_password.passwordstage` - Password Stage * `authentik_stages_prompt.prompt` - Prompt * `authentik_stages_prompt.promptstage` - Prompt Stage * `authentik_stages_user_delete.userdeletestage` - User Delete Stage * `authentik_stages_user_login.userloginstage` - User Login Stage * `authentik_stages_user_logout.userlogoutstage` - User Logout Stage * `authentik_stages_user_write.userwritestage` - User Write Stage * `authentik_brands.brand` - Brand * `authentik_blueprints.blueprintinstance` - Blueprint Instance * `authentik_core.group` - Group * `authentik_core.user` - User * `authentik_core.application` - Application * `authentik_core.token` - Token * `authentik_enterprise.license` - License * `authentik_providers_rac.racprovider` - RAC Provider * `authentik_providers_rac.endpoint` - RAC Endpoint * `authentik_providers_rac.racpropertymapping` - RAC Property Mapping + * @param model * `authentik_tenants.domain` - Domain * `authentik_crypto.certificatekeypair` - Certificate-Key Pair * `authentik_events.event` - Event * `authentik_events.notificationtransport` - Notification Transport * `authentik_events.notification` - Notification * `authentik_events.notificationrule` - Notification Rule * `authentik_events.notificationwebhookmapping` - Webhook Mapping * `authentik_flows.flow` - Flow * `authentik_flows.flowstagebinding` - Flow Stage Binding * `authentik_outposts.dockerserviceconnection` - Docker Service-Connection * `authentik_outposts.kubernetesserviceconnection` - Kubernetes Service-Connection * `authentik_outposts.outpost` - Outpost * `authentik_policies_dummy.dummypolicy` - Dummy Policy * `authentik_policies_event_matcher.eventmatcherpolicy` - Event Matcher Policy * `authentik_policies_expiry.passwordexpirypolicy` - Password Expiry Policy * `authentik_policies_expression.expressionpolicy` - Expression Policy * `authentik_policies_password.passwordpolicy` - Password Policy * `authentik_policies_reputation.reputationpolicy` - Reputation Policy * `authentik_policies.policybinding` - Policy Binding * `authentik_providers_ldap.ldapprovider` - LDAP Provider * `authentik_providers_oauth2.scopemapping` - Scope Mapping * `authentik_providers_oauth2.oauth2provider` - OAuth2/OpenID Provider * `authentik_providers_proxy.proxyprovider` - Proxy Provider * `authentik_providers_radius.radiusprovider` - Radius Provider * `authentik_providers_saml.samlprovider` - SAML Provider * `authentik_providers_saml.samlpropertymapping` - SAML Property Mapping * `authentik_providers_scim.scimprovider` - SCIM Provider * `authentik_providers_scim.scimmapping` - SCIM Mapping * `authentik_rbac.role` - Role * `authentik_sources_ldap.ldapsource` - LDAP Source * `authentik_sources_ldap.ldappropertymapping` - LDAP Property Mapping * `authentik_sources_oauth.oauthsource` - OAuth Source * `authentik_sources_oauth.useroauthsourceconnection` - User OAuth Source Connection * `authentik_sources_plex.plexsource` - Plex Source * `authentik_sources_plex.plexsourceconnection` - User Plex Source Connection * `authentik_sources_saml.samlsource` - SAML Source * `authentik_sources_saml.usersamlsourceconnection` - User SAML Source Connection * `authentik_stages_authenticator_duo.authenticatorduostage` - Duo Authenticator Setup Stage * `authentik_stages_authenticator_duo.duodevice` - Duo Device * `authentik_stages_authenticator_mobile.authenticatormobilestage` - Mobile Authenticator Setup Stage * `authentik_stages_authenticator_mobile.mobiledevice` - Mobile Device * `authentik_stages_authenticator_sms.authenticatorsmsstage` - SMS Authenticator Setup Stage * `authentik_stages_authenticator_sms.smsdevice` - SMS Device * `authentik_stages_authenticator_static.authenticatorstaticstage` - Static Authenticator Setup Stage * `authentik_stages_authenticator_static.staticdevice` - Static Device * `authentik_stages_authenticator_totp.authenticatortotpstage` - TOTP Authenticator Setup Stage * `authentik_stages_authenticator_totp.totpdevice` - TOTP Device * `authentik_stages_authenticator_validate.authenticatorvalidatestage` - Authenticator Validation Stage * `authentik_stages_authenticator_webauthn.authenticatewebauthnstage` - WebAuthn Authenticator Setup Stage * `authentik_stages_authenticator_webauthn.webauthndevice` - WebAuthn Device * `authentik_stages_captcha.captchastage` - Captcha Stage * `authentik_stages_consent.consentstage` - Consent Stage * `authentik_stages_consent.userconsent` - User Consent * `authentik_stages_deny.denystage` - Deny Stage * `authentik_stages_dummy.dummystage` - Dummy Stage * `authentik_stages_email.emailstage` - Email Stage * `authentik_stages_identification.identificationstage` - Identification Stage * `authentik_stages_invitation.invitationstage` - Invitation Stage * `authentik_stages_invitation.invitation` - Invitation * `authentik_stages_password.passwordstage` - Password Stage * `authentik_stages_prompt.prompt` - Prompt * `authentik_stages_prompt.promptstage` - Prompt Stage * `authentik_stages_user_delete.userdeletestage` - User Delete Stage * `authentik_stages_user_login.userloginstage` - User Login Stage * `authentik_stages_user_logout.userlogoutstage` - User Logout Stage * `authentik_stages_user_write.userwritestage` - User Write Stage * `authentik_brands.brand` - Brand * `authentik_blueprints.blueprintinstance` - Blueprint Instance * `authentik_core.group` - Group * `authentik_core.user` - User * `authentik_core.application` - Application * `authentik_core.token` - Token * `authentik_enterprise.license` - License * `authentik_providers_rac.racprovider` - RAC Provider * `authentik_providers_rac.endpoint` - RAC Endpoint * `authentik_providers_rac.racpropertymapping` - RAC Property Mapping * @param objectPk (optional) * @param ordering Which field to use when ordering the results. (optional) * @param page A page number within the paginated result set. (optional) @@ -278,7 +276,7 @@ class RbacApi(basePath: kotlin.String = defaultBasePath, client: OkHttpClient = /** * To obtain the request config of the operation rbacPermissionsAssignedByRolesList * - * @param model * `authentik_tenants.domain` - Domain * `authentik_crypto.certificatekeypair` - Certificate-Key Pair * `authentik_events.event` - Event * `authentik_events.notificationtransport` - Notification Transport * `authentik_events.notification` - Notification * `authentik_events.notificationrule` - Notification Rule * `authentik_events.notificationwebhookmapping` - Webhook Mapping * `authentik_flows.flow` - Flow * `authentik_flows.flowstagebinding` - Flow Stage Binding * `authentik_outposts.dockerserviceconnection` - Docker Service-Connection * `authentik_outposts.kubernetesserviceconnection` - Kubernetes Service-Connection * `authentik_outposts.outpost` - Outpost * `authentik_policies_dummy.dummypolicy` - Dummy Policy * `authentik_policies_event_matcher.eventmatcherpolicy` - Event Matcher Policy * `authentik_policies_expiry.passwordexpirypolicy` - Password Expiry Policy * `authentik_policies_expression.expressionpolicy` - Expression Policy * `authentik_policies_password.passwordpolicy` - Password Policy * `authentik_policies_reputation.reputationpolicy` - Reputation Policy * `authentik_policies_reputation.reputation` - Reputation Score * `authentik_policies.policybinding` - Policy Binding * `authentik_providers_ldap.ldapprovider` - LDAP Provider * `authentik_providers_oauth2.scopemapping` - Scope Mapping * `authentik_providers_oauth2.oauth2provider` - OAuth2/OpenID Provider * `authentik_providers_oauth2.authorizationcode` - Authorization Code * `authentik_providers_oauth2.accesstoken` - OAuth2 Access Token * `authentik_providers_oauth2.refreshtoken` - OAuth2 Refresh Token * `authentik_providers_proxy.proxyprovider` - Proxy Provider * `authentik_providers_radius.radiusprovider` - Radius Provider * `authentik_providers_saml.samlprovider` - SAML Provider * `authentik_providers_saml.samlpropertymapping` - SAML Property Mapping * `authentik_providers_scim.scimprovider` - SCIM Provider * `authentik_providers_scim.scimmapping` - SCIM Mapping * `authentik_rbac.role` - Role * `authentik_sources_ldap.ldapsource` - LDAP Source * `authentik_sources_ldap.ldappropertymapping` - LDAP Property Mapping * `authentik_sources_oauth.oauthsource` - OAuth Source * `authentik_sources_oauth.useroauthsourceconnection` - User OAuth Source Connection * `authentik_sources_plex.plexsource` - Plex Source * `authentik_sources_plex.plexsourceconnection` - User Plex Source Connection * `authentik_sources_saml.samlsource` - SAML Source * `authentik_sources_saml.usersamlsourceconnection` - User SAML Source Connection * `authentik_stages_authenticator_duo.authenticatorduostage` - Duo Authenticator Setup Stage * `authentik_stages_authenticator_duo.duodevice` - Duo Device * `authentik_stages_authenticator_sms.authenticatorsmsstage` - SMS Authenticator Setup Stage * `authentik_stages_authenticator_sms.smsdevice` - SMS Device * `authentik_stages_authenticator_static.authenticatorstaticstage` - Static Authenticator Stage * `authentik_stages_authenticator_static.staticdevice` - Static Device * `authentik_stages_authenticator_totp.authenticatortotpstage` - TOTP Authenticator Setup Stage * `authentik_stages_authenticator_totp.totpdevice` - TOTP Device * `authentik_stages_authenticator_validate.authenticatorvalidatestage` - Authenticator Validation Stage * `authentik_stages_authenticator_webauthn.authenticatewebauthnstage` - WebAuthn Authenticator Setup Stage * `authentik_stages_authenticator_webauthn.webauthndevice` - WebAuthn Device * `authentik_stages_captcha.captchastage` - Captcha Stage * `authentik_stages_consent.consentstage` - Consent Stage * `authentik_stages_consent.userconsent` - User Consent * `authentik_stages_deny.denystage` - Deny Stage * `authentik_stages_dummy.dummystage` - Dummy Stage * `authentik_stages_email.emailstage` - Email Stage * `authentik_stages_identification.identificationstage` - Identification Stage * `authentik_stages_invitation.invitationstage` - Invitation Stage * `authentik_stages_invitation.invitation` - Invitation * `authentik_stages_password.passwordstage` - Password Stage * `authentik_stages_prompt.prompt` - Prompt * `authentik_stages_prompt.promptstage` - Prompt Stage * `authentik_stages_user_delete.userdeletestage` - User Delete Stage * `authentik_stages_user_login.userloginstage` - User Login Stage * `authentik_stages_user_logout.userlogoutstage` - User Logout Stage * `authentik_stages_user_write.userwritestage` - User Write Stage * `authentik_brands.brand` - Brand * `authentik_blueprints.blueprintinstance` - Blueprint Instance * `authentik_core.group` - Group * `authentik_core.user` - User * `authentik_core.application` - Application * `authentik_core.token` - Token * `authentik_enterprise.license` - License * `authentik_providers_rac.racprovider` - RAC Provider * `authentik_providers_rac.endpoint` - RAC Endpoint * `authentik_providers_rac.racpropertymapping` - RAC Property Mapping + * @param model * `authentik_tenants.domain` - Domain * `authentik_crypto.certificatekeypair` - Certificate-Key Pair * `authentik_events.event` - Event * `authentik_events.notificationtransport` - Notification Transport * `authentik_events.notification` - Notification * `authentik_events.notificationrule` - Notification Rule * `authentik_events.notificationwebhookmapping` - Webhook Mapping * `authentik_flows.flow` - Flow * `authentik_flows.flowstagebinding` - Flow Stage Binding * `authentik_outposts.dockerserviceconnection` - Docker Service-Connection * `authentik_outposts.kubernetesserviceconnection` - Kubernetes Service-Connection * `authentik_outposts.outpost` - Outpost * `authentik_policies_dummy.dummypolicy` - Dummy Policy * `authentik_policies_event_matcher.eventmatcherpolicy` - Event Matcher Policy * `authentik_policies_expiry.passwordexpirypolicy` - Password Expiry Policy * `authentik_policies_expression.expressionpolicy` - Expression Policy * `authentik_policies_password.passwordpolicy` - Password Policy * `authentik_policies_reputation.reputationpolicy` - Reputation Policy * `authentik_policies.policybinding` - Policy Binding * `authentik_providers_ldap.ldapprovider` - LDAP Provider * `authentik_providers_oauth2.scopemapping` - Scope Mapping * `authentik_providers_oauth2.oauth2provider` - OAuth2/OpenID Provider * `authentik_providers_proxy.proxyprovider` - Proxy Provider * `authentik_providers_radius.radiusprovider` - Radius Provider * `authentik_providers_saml.samlprovider` - SAML Provider * `authentik_providers_saml.samlpropertymapping` - SAML Property Mapping * `authentik_providers_scim.scimprovider` - SCIM Provider * `authentik_providers_scim.scimmapping` - SCIM Mapping * `authentik_rbac.role` - Role * `authentik_sources_ldap.ldapsource` - LDAP Source * `authentik_sources_ldap.ldappropertymapping` - LDAP Property Mapping * `authentik_sources_oauth.oauthsource` - OAuth Source * `authentik_sources_oauth.useroauthsourceconnection` - User OAuth Source Connection * `authentik_sources_plex.plexsource` - Plex Source * `authentik_sources_plex.plexsourceconnection` - User Plex Source Connection * `authentik_sources_saml.samlsource` - SAML Source * `authentik_sources_saml.usersamlsourceconnection` - User SAML Source Connection * `authentik_stages_authenticator_duo.authenticatorduostage` - Duo Authenticator Setup Stage * `authentik_stages_authenticator_duo.duodevice` - Duo Device * `authentik_stages_authenticator_mobile.authenticatormobilestage` - Mobile Authenticator Setup Stage * `authentik_stages_authenticator_mobile.mobiledevice` - Mobile Device * `authentik_stages_authenticator_sms.authenticatorsmsstage` - SMS Authenticator Setup Stage * `authentik_stages_authenticator_sms.smsdevice` - SMS Device * `authentik_stages_authenticator_static.authenticatorstaticstage` - Static Authenticator Setup Stage * `authentik_stages_authenticator_static.staticdevice` - Static Device * `authentik_stages_authenticator_totp.authenticatortotpstage` - TOTP Authenticator Setup Stage * `authentik_stages_authenticator_totp.totpdevice` - TOTP Device * `authentik_stages_authenticator_validate.authenticatorvalidatestage` - Authenticator Validation Stage * `authentik_stages_authenticator_webauthn.authenticatewebauthnstage` - WebAuthn Authenticator Setup Stage * `authentik_stages_authenticator_webauthn.webauthndevice` - WebAuthn Device * `authentik_stages_captcha.captchastage` - Captcha Stage * `authentik_stages_consent.consentstage` - Consent Stage * `authentik_stages_consent.userconsent` - User Consent * `authentik_stages_deny.denystage` - Deny Stage * `authentik_stages_dummy.dummystage` - Dummy Stage * `authentik_stages_email.emailstage` - Email Stage * `authentik_stages_identification.identificationstage` - Identification Stage * `authentik_stages_invitation.invitationstage` - Invitation Stage * `authentik_stages_invitation.invitation` - Invitation * `authentik_stages_password.passwordstage` - Password Stage * `authentik_stages_prompt.prompt` - Prompt * `authentik_stages_prompt.promptstage` - Prompt Stage * `authentik_stages_user_delete.userdeletestage` - User Delete Stage * `authentik_stages_user_login.userloginstage` - User Login Stage * `authentik_stages_user_logout.userlogoutstage` - User Logout Stage * `authentik_stages_user_write.userwritestage` - User Write Stage * `authentik_brands.brand` - Brand * `authentik_blueprints.blueprintinstance` - Blueprint Instance * `authentik_core.group` - Group * `authentik_core.user` - User * `authentik_core.application` - Application * `authentik_core.token` - Token * `authentik_enterprise.license` - License * `authentik_providers_rac.racprovider` - RAC Provider * `authentik_providers_rac.endpoint` - RAC Endpoint * `authentik_providers_rac.racpropertymapping` - RAC Property Mapping * @param objectPk (optional) * @param ordering Which field to use when ordering the results. (optional) * @param page A page number within the paginated result set. (optional) @@ -494,13 +492,9 @@ class RbacApi(basePath: kotlin.String = defaultBasePath, client: OkHttpClient = @Json(name = "authentik_policies_expiry.passwordexpirypolicy") policiesExpiryPeriodPasswordexpirypolicy("authentik_policies_expiry.passwordexpirypolicy"), @Json(name = "authentik_policies_expression.expressionpolicy") policiesExpressionPeriodExpressionpolicy("authentik_policies_expression.expressionpolicy"), @Json(name = "authentik_policies_password.passwordpolicy") policiesPasswordPeriodPasswordpolicy("authentik_policies_password.passwordpolicy"), - @Json(name = "authentik_policies_reputation.reputation") policiesReputationPeriodReputation("authentik_policies_reputation.reputation"), @Json(name = "authentik_policies_reputation.reputationpolicy") policiesReputationPeriodReputationpolicy("authentik_policies_reputation.reputationpolicy"), @Json(name = "authentik_providers_ldap.ldapprovider") providersLdapPeriodLdapprovider("authentik_providers_ldap.ldapprovider"), - @Json(name = "authentik_providers_oauth2.accesstoken") providersOauth2PeriodAccesstoken("authentik_providers_oauth2.accesstoken"), - @Json(name = "authentik_providers_oauth2.authorizationcode") providersOauth2PeriodAuthorizationcode("authentik_providers_oauth2.authorizationcode"), @Json(name = "authentik_providers_oauth2.oauth2provider") providersOauth2PeriodOauth2provider("authentik_providers_oauth2.oauth2provider"), - @Json(name = "authentik_providers_oauth2.refreshtoken") providersOauth2PeriodRefreshtoken("authentik_providers_oauth2.refreshtoken"), @Json(name = "authentik_providers_oauth2.scopemapping") providersOauth2PeriodScopemapping("authentik_providers_oauth2.scopemapping"), @Json(name = "authentik_providers_proxy.proxyprovider") providersProxyPeriodProxyprovider("authentik_providers_proxy.proxyprovider"), @Json(name = "authentik_providers_rac.endpoint") providersRacPeriodEndpoint("authentik_providers_rac.endpoint"), @@ -522,6 +516,8 @@ class RbacApi(basePath: kotlin.String = defaultBasePath, client: OkHttpClient = @Json(name = "authentik_sources_saml.usersamlsourceconnection") sourcesSamlPeriodUsersamlsourceconnection("authentik_sources_saml.usersamlsourceconnection"), @Json(name = "authentik_stages_authenticator_duo.authenticatorduostage") stagesAuthenticatorDuoPeriodAuthenticatorduostage("authentik_stages_authenticator_duo.authenticatorduostage"), @Json(name = "authentik_stages_authenticator_duo.duodevice") stagesAuthenticatorDuoPeriodDuodevice("authentik_stages_authenticator_duo.duodevice"), + @Json(name = "authentik_stages_authenticator_mobile.authenticatormobilestage") stagesAuthenticatorMobilePeriodAuthenticatormobilestage("authentik_stages_authenticator_mobile.authenticatormobilestage"), + @Json(name = "authentik_stages_authenticator_mobile.mobiledevice") stagesAuthenticatorMobilePeriodMobiledevice("authentik_stages_authenticator_mobile.mobiledevice"), @Json(name = "authentik_stages_authenticator_sms.authenticatorsmsstage") stagesAuthenticatorSmsPeriodAuthenticatorsmsstage("authentik_stages_authenticator_sms.authenticatorsmsstage"), @Json(name = "authentik_stages_authenticator_sms.smsdevice") stagesAuthenticatorSmsPeriodSmsdevice("authentik_stages_authenticator_sms.smsdevice"), @Json(name = "authentik_stages_authenticator_static.authenticatorstaticstage") stagesAuthenticatorStaticPeriodAuthenticatorstaticstage("authentik_stages_authenticator_static.authenticatorstaticstage"), @@ -553,7 +549,7 @@ class RbacApi(basePath: kotlin.String = defaultBasePath, client: OkHttpClient = /** * * Get assigned object permissions for a single object - * @param model * `authentik_tenants.domain` - Domain * `authentik_crypto.certificatekeypair` - Certificate-Key Pair * `authentik_events.event` - Event * `authentik_events.notificationtransport` - Notification Transport * `authentik_events.notification` - Notification * `authentik_events.notificationrule` - Notification Rule * `authentik_events.notificationwebhookmapping` - Webhook Mapping * `authentik_flows.flow` - Flow * `authentik_flows.flowstagebinding` - Flow Stage Binding * `authentik_outposts.dockerserviceconnection` - Docker Service-Connection * `authentik_outposts.kubernetesserviceconnection` - Kubernetes Service-Connection * `authentik_outposts.outpost` - Outpost * `authentik_policies_dummy.dummypolicy` - Dummy Policy * `authentik_policies_event_matcher.eventmatcherpolicy` - Event Matcher Policy * `authentik_policies_expiry.passwordexpirypolicy` - Password Expiry Policy * `authentik_policies_expression.expressionpolicy` - Expression Policy * `authentik_policies_password.passwordpolicy` - Password Policy * `authentik_policies_reputation.reputationpolicy` - Reputation Policy * `authentik_policies_reputation.reputation` - Reputation Score * `authentik_policies.policybinding` - Policy Binding * `authentik_providers_ldap.ldapprovider` - LDAP Provider * `authentik_providers_oauth2.scopemapping` - Scope Mapping * `authentik_providers_oauth2.oauth2provider` - OAuth2/OpenID Provider * `authentik_providers_oauth2.authorizationcode` - Authorization Code * `authentik_providers_oauth2.accesstoken` - OAuth2 Access Token * `authentik_providers_oauth2.refreshtoken` - OAuth2 Refresh Token * `authentik_providers_proxy.proxyprovider` - Proxy Provider * `authentik_providers_radius.radiusprovider` - Radius Provider * `authentik_providers_saml.samlprovider` - SAML Provider * `authentik_providers_saml.samlpropertymapping` - SAML Property Mapping * `authentik_providers_scim.scimprovider` - SCIM Provider * `authentik_providers_scim.scimmapping` - SCIM Mapping * `authentik_rbac.role` - Role * `authentik_sources_ldap.ldapsource` - LDAP Source * `authentik_sources_ldap.ldappropertymapping` - LDAP Property Mapping * `authentik_sources_oauth.oauthsource` - OAuth Source * `authentik_sources_oauth.useroauthsourceconnection` - User OAuth Source Connection * `authentik_sources_plex.plexsource` - Plex Source * `authentik_sources_plex.plexsourceconnection` - User Plex Source Connection * `authentik_sources_saml.samlsource` - SAML Source * `authentik_sources_saml.usersamlsourceconnection` - User SAML Source Connection * `authentik_stages_authenticator_duo.authenticatorduostage` - Duo Authenticator Setup Stage * `authentik_stages_authenticator_duo.duodevice` - Duo Device * `authentik_stages_authenticator_sms.authenticatorsmsstage` - SMS Authenticator Setup Stage * `authentik_stages_authenticator_sms.smsdevice` - SMS Device * `authentik_stages_authenticator_static.authenticatorstaticstage` - Static Authenticator Stage * `authentik_stages_authenticator_static.staticdevice` - Static Device * `authentik_stages_authenticator_totp.authenticatortotpstage` - TOTP Authenticator Setup Stage * `authentik_stages_authenticator_totp.totpdevice` - TOTP Device * `authentik_stages_authenticator_validate.authenticatorvalidatestage` - Authenticator Validation Stage * `authentik_stages_authenticator_webauthn.authenticatewebauthnstage` - WebAuthn Authenticator Setup Stage * `authentik_stages_authenticator_webauthn.webauthndevice` - WebAuthn Device * `authentik_stages_captcha.captchastage` - Captcha Stage * `authentik_stages_consent.consentstage` - Consent Stage * `authentik_stages_consent.userconsent` - User Consent * `authentik_stages_deny.denystage` - Deny Stage * `authentik_stages_dummy.dummystage` - Dummy Stage * `authentik_stages_email.emailstage` - Email Stage * `authentik_stages_identification.identificationstage` - Identification Stage * `authentik_stages_invitation.invitationstage` - Invitation Stage * `authentik_stages_invitation.invitation` - Invitation * `authentik_stages_password.passwordstage` - Password Stage * `authentik_stages_prompt.prompt` - Prompt * `authentik_stages_prompt.promptstage` - Prompt Stage * `authentik_stages_user_delete.userdeletestage` - User Delete Stage * `authentik_stages_user_login.userloginstage` - User Login Stage * `authentik_stages_user_logout.userlogoutstage` - User Logout Stage * `authentik_stages_user_write.userwritestage` - User Write Stage * `authentik_brands.brand` - Brand * `authentik_blueprints.blueprintinstance` - Blueprint Instance * `authentik_core.group` - Group * `authentik_core.user` - User * `authentik_core.application` - Application * `authentik_core.token` - Token * `authentik_enterprise.license` - License * `authentik_providers_rac.racprovider` - RAC Provider * `authentik_providers_rac.endpoint` - RAC Endpoint * `authentik_providers_rac.racpropertymapping` - RAC Property Mapping + * @param model * `authentik_tenants.domain` - Domain * `authentik_crypto.certificatekeypair` - Certificate-Key Pair * `authentik_events.event` - Event * `authentik_events.notificationtransport` - Notification Transport * `authentik_events.notification` - Notification * `authentik_events.notificationrule` - Notification Rule * `authentik_events.notificationwebhookmapping` - Webhook Mapping * `authentik_flows.flow` - Flow * `authentik_flows.flowstagebinding` - Flow Stage Binding * `authentik_outposts.dockerserviceconnection` - Docker Service-Connection * `authentik_outposts.kubernetesserviceconnection` - Kubernetes Service-Connection * `authentik_outposts.outpost` - Outpost * `authentik_policies_dummy.dummypolicy` - Dummy Policy * `authentik_policies_event_matcher.eventmatcherpolicy` - Event Matcher Policy * `authentik_policies_expiry.passwordexpirypolicy` - Password Expiry Policy * `authentik_policies_expression.expressionpolicy` - Expression Policy * `authentik_policies_password.passwordpolicy` - Password Policy * `authentik_policies_reputation.reputationpolicy` - Reputation Policy * `authentik_policies.policybinding` - Policy Binding * `authentik_providers_ldap.ldapprovider` - LDAP Provider * `authentik_providers_oauth2.scopemapping` - Scope Mapping * `authentik_providers_oauth2.oauth2provider` - OAuth2/OpenID Provider * `authentik_providers_proxy.proxyprovider` - Proxy Provider * `authentik_providers_radius.radiusprovider` - Radius Provider * `authentik_providers_saml.samlprovider` - SAML Provider * `authentik_providers_saml.samlpropertymapping` - SAML Property Mapping * `authentik_providers_scim.scimprovider` - SCIM Provider * `authentik_providers_scim.scimmapping` - SCIM Mapping * `authentik_rbac.role` - Role * `authentik_sources_ldap.ldapsource` - LDAP Source * `authentik_sources_ldap.ldappropertymapping` - LDAP Property Mapping * `authentik_sources_oauth.oauthsource` - OAuth Source * `authentik_sources_oauth.useroauthsourceconnection` - User OAuth Source Connection * `authentik_sources_plex.plexsource` - Plex Source * `authentik_sources_plex.plexsourceconnection` - User Plex Source Connection * `authentik_sources_saml.samlsource` - SAML Source * `authentik_sources_saml.usersamlsourceconnection` - User SAML Source Connection * `authentik_stages_authenticator_duo.authenticatorduostage` - Duo Authenticator Setup Stage * `authentik_stages_authenticator_duo.duodevice` - Duo Device * `authentik_stages_authenticator_mobile.authenticatormobilestage` - Mobile Authenticator Setup Stage * `authentik_stages_authenticator_mobile.mobiledevice` - Mobile Device * `authentik_stages_authenticator_sms.authenticatorsmsstage` - SMS Authenticator Setup Stage * `authentik_stages_authenticator_sms.smsdevice` - SMS Device * `authentik_stages_authenticator_static.authenticatorstaticstage` - Static Authenticator Setup Stage * `authentik_stages_authenticator_static.staticdevice` - Static Device * `authentik_stages_authenticator_totp.authenticatortotpstage` - TOTP Authenticator Setup Stage * `authentik_stages_authenticator_totp.totpdevice` - TOTP Device * `authentik_stages_authenticator_validate.authenticatorvalidatestage` - Authenticator Validation Stage * `authentik_stages_authenticator_webauthn.authenticatewebauthnstage` - WebAuthn Authenticator Setup Stage * `authentik_stages_authenticator_webauthn.webauthndevice` - WebAuthn Device * `authentik_stages_captcha.captchastage` - Captcha Stage * `authentik_stages_consent.consentstage` - Consent Stage * `authentik_stages_consent.userconsent` - User Consent * `authentik_stages_deny.denystage` - Deny Stage * `authentik_stages_dummy.dummystage` - Dummy Stage * `authentik_stages_email.emailstage` - Email Stage * `authentik_stages_identification.identificationstage` - Identification Stage * `authentik_stages_invitation.invitationstage` - Invitation Stage * `authentik_stages_invitation.invitation` - Invitation * `authentik_stages_password.passwordstage` - Password Stage * `authentik_stages_prompt.prompt` - Prompt * `authentik_stages_prompt.promptstage` - Prompt Stage * `authentik_stages_user_delete.userdeletestage` - User Delete Stage * `authentik_stages_user_login.userloginstage` - User Login Stage * `authentik_stages_user_logout.userlogoutstage` - User Logout Stage * `authentik_stages_user_write.userwritestage` - User Write Stage * `authentik_brands.brand` - Brand * `authentik_blueprints.blueprintinstance` - Blueprint Instance * `authentik_core.group` - Group * `authentik_core.user` - User * `authentik_core.application` - Application * `authentik_core.token` - Token * `authentik_enterprise.license` - License * `authentik_providers_rac.racprovider` - RAC Provider * `authentik_providers_rac.endpoint` - RAC Endpoint * `authentik_providers_rac.racpropertymapping` - RAC Property Mapping * @param objectPk (optional) * @param ordering Which field to use when ordering the results. (optional) * @param page A page number within the paginated result set. (optional) @@ -589,7 +585,7 @@ class RbacApi(basePath: kotlin.String = defaultBasePath, client: OkHttpClient = /** * * Get assigned object permissions for a single object - * @param model * `authentik_tenants.domain` - Domain * `authentik_crypto.certificatekeypair` - Certificate-Key Pair * `authentik_events.event` - Event * `authentik_events.notificationtransport` - Notification Transport * `authentik_events.notification` - Notification * `authentik_events.notificationrule` - Notification Rule * `authentik_events.notificationwebhookmapping` - Webhook Mapping * `authentik_flows.flow` - Flow * `authentik_flows.flowstagebinding` - Flow Stage Binding * `authentik_outposts.dockerserviceconnection` - Docker Service-Connection * `authentik_outposts.kubernetesserviceconnection` - Kubernetes Service-Connection * `authentik_outposts.outpost` - Outpost * `authentik_policies_dummy.dummypolicy` - Dummy Policy * `authentik_policies_event_matcher.eventmatcherpolicy` - Event Matcher Policy * `authentik_policies_expiry.passwordexpirypolicy` - Password Expiry Policy * `authentik_policies_expression.expressionpolicy` - Expression Policy * `authentik_policies_password.passwordpolicy` - Password Policy * `authentik_policies_reputation.reputationpolicy` - Reputation Policy * `authentik_policies_reputation.reputation` - Reputation Score * `authentik_policies.policybinding` - Policy Binding * `authentik_providers_ldap.ldapprovider` - LDAP Provider * `authentik_providers_oauth2.scopemapping` - Scope Mapping * `authentik_providers_oauth2.oauth2provider` - OAuth2/OpenID Provider * `authentik_providers_oauth2.authorizationcode` - Authorization Code * `authentik_providers_oauth2.accesstoken` - OAuth2 Access Token * `authentik_providers_oauth2.refreshtoken` - OAuth2 Refresh Token * `authentik_providers_proxy.proxyprovider` - Proxy Provider * `authentik_providers_radius.radiusprovider` - Radius Provider * `authentik_providers_saml.samlprovider` - SAML Provider * `authentik_providers_saml.samlpropertymapping` - SAML Property Mapping * `authentik_providers_scim.scimprovider` - SCIM Provider * `authentik_providers_scim.scimmapping` - SCIM Mapping * `authentik_rbac.role` - Role * `authentik_sources_ldap.ldapsource` - LDAP Source * `authentik_sources_ldap.ldappropertymapping` - LDAP Property Mapping * `authentik_sources_oauth.oauthsource` - OAuth Source * `authentik_sources_oauth.useroauthsourceconnection` - User OAuth Source Connection * `authentik_sources_plex.plexsource` - Plex Source * `authentik_sources_plex.plexsourceconnection` - User Plex Source Connection * `authentik_sources_saml.samlsource` - SAML Source * `authentik_sources_saml.usersamlsourceconnection` - User SAML Source Connection * `authentik_stages_authenticator_duo.authenticatorduostage` - Duo Authenticator Setup Stage * `authentik_stages_authenticator_duo.duodevice` - Duo Device * `authentik_stages_authenticator_sms.authenticatorsmsstage` - SMS Authenticator Setup Stage * `authentik_stages_authenticator_sms.smsdevice` - SMS Device * `authentik_stages_authenticator_static.authenticatorstaticstage` - Static Authenticator Stage * `authentik_stages_authenticator_static.staticdevice` - Static Device * `authentik_stages_authenticator_totp.authenticatortotpstage` - TOTP Authenticator Setup Stage * `authentik_stages_authenticator_totp.totpdevice` - TOTP Device * `authentik_stages_authenticator_validate.authenticatorvalidatestage` - Authenticator Validation Stage * `authentik_stages_authenticator_webauthn.authenticatewebauthnstage` - WebAuthn Authenticator Setup Stage * `authentik_stages_authenticator_webauthn.webauthndevice` - WebAuthn Device * `authentik_stages_captcha.captchastage` - Captcha Stage * `authentik_stages_consent.consentstage` - Consent Stage * `authentik_stages_consent.userconsent` - User Consent * `authentik_stages_deny.denystage` - Deny Stage * `authentik_stages_dummy.dummystage` - Dummy Stage * `authentik_stages_email.emailstage` - Email Stage * `authentik_stages_identification.identificationstage` - Identification Stage * `authentik_stages_invitation.invitationstage` - Invitation Stage * `authentik_stages_invitation.invitation` - Invitation * `authentik_stages_password.passwordstage` - Password Stage * `authentik_stages_prompt.prompt` - Prompt * `authentik_stages_prompt.promptstage` - Prompt Stage * `authentik_stages_user_delete.userdeletestage` - User Delete Stage * `authentik_stages_user_login.userloginstage` - User Login Stage * `authentik_stages_user_logout.userlogoutstage` - User Logout Stage * `authentik_stages_user_write.userwritestage` - User Write Stage * `authentik_brands.brand` - Brand * `authentik_blueprints.blueprintinstance` - Blueprint Instance * `authentik_core.group` - Group * `authentik_core.user` - User * `authentik_core.application` - Application * `authentik_core.token` - Token * `authentik_enterprise.license` - License * `authentik_providers_rac.racprovider` - RAC Provider * `authentik_providers_rac.endpoint` - RAC Endpoint * `authentik_providers_rac.racpropertymapping` - RAC Property Mapping + * @param model * `authentik_tenants.domain` - Domain * `authentik_crypto.certificatekeypair` - Certificate-Key Pair * `authentik_events.event` - Event * `authentik_events.notificationtransport` - Notification Transport * `authentik_events.notification` - Notification * `authentik_events.notificationrule` - Notification Rule * `authentik_events.notificationwebhookmapping` - Webhook Mapping * `authentik_flows.flow` - Flow * `authentik_flows.flowstagebinding` - Flow Stage Binding * `authentik_outposts.dockerserviceconnection` - Docker Service-Connection * `authentik_outposts.kubernetesserviceconnection` - Kubernetes Service-Connection * `authentik_outposts.outpost` - Outpost * `authentik_policies_dummy.dummypolicy` - Dummy Policy * `authentik_policies_event_matcher.eventmatcherpolicy` - Event Matcher Policy * `authentik_policies_expiry.passwordexpirypolicy` - Password Expiry Policy * `authentik_policies_expression.expressionpolicy` - Expression Policy * `authentik_policies_password.passwordpolicy` - Password Policy * `authentik_policies_reputation.reputationpolicy` - Reputation Policy * `authentik_policies.policybinding` - Policy Binding * `authentik_providers_ldap.ldapprovider` - LDAP Provider * `authentik_providers_oauth2.scopemapping` - Scope Mapping * `authentik_providers_oauth2.oauth2provider` - OAuth2/OpenID Provider * `authentik_providers_proxy.proxyprovider` - Proxy Provider * `authentik_providers_radius.radiusprovider` - Radius Provider * `authentik_providers_saml.samlprovider` - SAML Provider * `authentik_providers_saml.samlpropertymapping` - SAML Property Mapping * `authentik_providers_scim.scimprovider` - SCIM Provider * `authentik_providers_scim.scimmapping` - SCIM Mapping * `authentik_rbac.role` - Role * `authentik_sources_ldap.ldapsource` - LDAP Source * `authentik_sources_ldap.ldappropertymapping` - LDAP Property Mapping * `authentik_sources_oauth.oauthsource` - OAuth Source * `authentik_sources_oauth.useroauthsourceconnection` - User OAuth Source Connection * `authentik_sources_plex.plexsource` - Plex Source * `authentik_sources_plex.plexsourceconnection` - User Plex Source Connection * `authentik_sources_saml.samlsource` - SAML Source * `authentik_sources_saml.usersamlsourceconnection` - User SAML Source Connection * `authentik_stages_authenticator_duo.authenticatorduostage` - Duo Authenticator Setup Stage * `authentik_stages_authenticator_duo.duodevice` - Duo Device * `authentik_stages_authenticator_mobile.authenticatormobilestage` - Mobile Authenticator Setup Stage * `authentik_stages_authenticator_mobile.mobiledevice` - Mobile Device * `authentik_stages_authenticator_sms.authenticatorsmsstage` - SMS Authenticator Setup Stage * `authentik_stages_authenticator_sms.smsdevice` - SMS Device * `authentik_stages_authenticator_static.authenticatorstaticstage` - Static Authenticator Setup Stage * `authentik_stages_authenticator_static.staticdevice` - Static Device * `authentik_stages_authenticator_totp.authenticatortotpstage` - TOTP Authenticator Setup Stage * `authentik_stages_authenticator_totp.totpdevice` - TOTP Device * `authentik_stages_authenticator_validate.authenticatorvalidatestage` - Authenticator Validation Stage * `authentik_stages_authenticator_webauthn.authenticatewebauthnstage` - WebAuthn Authenticator Setup Stage * `authentik_stages_authenticator_webauthn.webauthndevice` - WebAuthn Device * `authentik_stages_captcha.captchastage` - Captcha Stage * `authentik_stages_consent.consentstage` - Consent Stage * `authentik_stages_consent.userconsent` - User Consent * `authentik_stages_deny.denystage` - Deny Stage * `authentik_stages_dummy.dummystage` - Dummy Stage * `authentik_stages_email.emailstage` - Email Stage * `authentik_stages_identification.identificationstage` - Identification Stage * `authentik_stages_invitation.invitationstage` - Invitation Stage * `authentik_stages_invitation.invitation` - Invitation * `authentik_stages_password.passwordstage` - Password Stage * `authentik_stages_prompt.prompt` - Prompt * `authentik_stages_prompt.promptstage` - Prompt Stage * `authentik_stages_user_delete.userdeletestage` - User Delete Stage * `authentik_stages_user_login.userloginstage` - User Login Stage * `authentik_stages_user_logout.userlogoutstage` - User Logout Stage * `authentik_stages_user_write.userwritestage` - User Write Stage * `authentik_brands.brand` - Brand * `authentik_blueprints.blueprintinstance` - Blueprint Instance * `authentik_core.group` - Group * `authentik_core.user` - User * `authentik_core.application` - Application * `authentik_core.token` - Token * `authentik_enterprise.license` - License * `authentik_providers_rac.racprovider` - RAC Provider * `authentik_providers_rac.endpoint` - RAC Endpoint * `authentik_providers_rac.racpropertymapping` - RAC Property Mapping * @param objectPk (optional) * @param ordering Which field to use when ordering the results. (optional) * @param page A page number within the paginated result set. (optional) @@ -612,7 +608,7 @@ class RbacApi(basePath: kotlin.String = defaultBasePath, client: OkHttpClient = /** * To obtain the request config of the operation rbacPermissionsAssignedByUsersList * - * @param model * `authentik_tenants.domain` - Domain * `authentik_crypto.certificatekeypair` - Certificate-Key Pair * `authentik_events.event` - Event * `authentik_events.notificationtransport` - Notification Transport * `authentik_events.notification` - Notification * `authentik_events.notificationrule` - Notification Rule * `authentik_events.notificationwebhookmapping` - Webhook Mapping * `authentik_flows.flow` - Flow * `authentik_flows.flowstagebinding` - Flow Stage Binding * `authentik_outposts.dockerserviceconnection` - Docker Service-Connection * `authentik_outposts.kubernetesserviceconnection` - Kubernetes Service-Connection * `authentik_outposts.outpost` - Outpost * `authentik_policies_dummy.dummypolicy` - Dummy Policy * `authentik_policies_event_matcher.eventmatcherpolicy` - Event Matcher Policy * `authentik_policies_expiry.passwordexpirypolicy` - Password Expiry Policy * `authentik_policies_expression.expressionpolicy` - Expression Policy * `authentik_policies_password.passwordpolicy` - Password Policy * `authentik_policies_reputation.reputationpolicy` - Reputation Policy * `authentik_policies_reputation.reputation` - Reputation Score * `authentik_policies.policybinding` - Policy Binding * `authentik_providers_ldap.ldapprovider` - LDAP Provider * `authentik_providers_oauth2.scopemapping` - Scope Mapping * `authentik_providers_oauth2.oauth2provider` - OAuth2/OpenID Provider * `authentik_providers_oauth2.authorizationcode` - Authorization Code * `authentik_providers_oauth2.accesstoken` - OAuth2 Access Token * `authentik_providers_oauth2.refreshtoken` - OAuth2 Refresh Token * `authentik_providers_proxy.proxyprovider` - Proxy Provider * `authentik_providers_radius.radiusprovider` - Radius Provider * `authentik_providers_saml.samlprovider` - SAML Provider * `authentik_providers_saml.samlpropertymapping` - SAML Property Mapping * `authentik_providers_scim.scimprovider` - SCIM Provider * `authentik_providers_scim.scimmapping` - SCIM Mapping * `authentik_rbac.role` - Role * `authentik_sources_ldap.ldapsource` - LDAP Source * `authentik_sources_ldap.ldappropertymapping` - LDAP Property Mapping * `authentik_sources_oauth.oauthsource` - OAuth Source * `authentik_sources_oauth.useroauthsourceconnection` - User OAuth Source Connection * `authentik_sources_plex.plexsource` - Plex Source * `authentik_sources_plex.plexsourceconnection` - User Plex Source Connection * `authentik_sources_saml.samlsource` - SAML Source * `authentik_sources_saml.usersamlsourceconnection` - User SAML Source Connection * `authentik_stages_authenticator_duo.authenticatorduostage` - Duo Authenticator Setup Stage * `authentik_stages_authenticator_duo.duodevice` - Duo Device * `authentik_stages_authenticator_sms.authenticatorsmsstage` - SMS Authenticator Setup Stage * `authentik_stages_authenticator_sms.smsdevice` - SMS Device * `authentik_stages_authenticator_static.authenticatorstaticstage` - Static Authenticator Stage * `authentik_stages_authenticator_static.staticdevice` - Static Device * `authentik_stages_authenticator_totp.authenticatortotpstage` - TOTP Authenticator Setup Stage * `authentik_stages_authenticator_totp.totpdevice` - TOTP Device * `authentik_stages_authenticator_validate.authenticatorvalidatestage` - Authenticator Validation Stage * `authentik_stages_authenticator_webauthn.authenticatewebauthnstage` - WebAuthn Authenticator Setup Stage * `authentik_stages_authenticator_webauthn.webauthndevice` - WebAuthn Device * `authentik_stages_captcha.captchastage` - Captcha Stage * `authentik_stages_consent.consentstage` - Consent Stage * `authentik_stages_consent.userconsent` - User Consent * `authentik_stages_deny.denystage` - Deny Stage * `authentik_stages_dummy.dummystage` - Dummy Stage * `authentik_stages_email.emailstage` - Email Stage * `authentik_stages_identification.identificationstage` - Identification Stage * `authentik_stages_invitation.invitationstage` - Invitation Stage * `authentik_stages_invitation.invitation` - Invitation * `authentik_stages_password.passwordstage` - Password Stage * `authentik_stages_prompt.prompt` - Prompt * `authentik_stages_prompt.promptstage` - Prompt Stage * `authentik_stages_user_delete.userdeletestage` - User Delete Stage * `authentik_stages_user_login.userloginstage` - User Login Stage * `authentik_stages_user_logout.userlogoutstage` - User Logout Stage * `authentik_stages_user_write.userwritestage` - User Write Stage * `authentik_brands.brand` - Brand * `authentik_blueprints.blueprintinstance` - Blueprint Instance * `authentik_core.group` - Group * `authentik_core.user` - User * `authentik_core.application` - Application * `authentik_core.token` - Token * `authentik_enterprise.license` - License * `authentik_providers_rac.racprovider` - RAC Provider * `authentik_providers_rac.endpoint` - RAC Endpoint * `authentik_providers_rac.racpropertymapping` - RAC Property Mapping + * @param model * `authentik_tenants.domain` - Domain * `authentik_crypto.certificatekeypair` - Certificate-Key Pair * `authentik_events.event` - Event * `authentik_events.notificationtransport` - Notification Transport * `authentik_events.notification` - Notification * `authentik_events.notificationrule` - Notification Rule * `authentik_events.notificationwebhookmapping` - Webhook Mapping * `authentik_flows.flow` - Flow * `authentik_flows.flowstagebinding` - Flow Stage Binding * `authentik_outposts.dockerserviceconnection` - Docker Service-Connection * `authentik_outposts.kubernetesserviceconnection` - Kubernetes Service-Connection * `authentik_outposts.outpost` - Outpost * `authentik_policies_dummy.dummypolicy` - Dummy Policy * `authentik_policies_event_matcher.eventmatcherpolicy` - Event Matcher Policy * `authentik_policies_expiry.passwordexpirypolicy` - Password Expiry Policy * `authentik_policies_expression.expressionpolicy` - Expression Policy * `authentik_policies_password.passwordpolicy` - Password Policy * `authentik_policies_reputation.reputationpolicy` - Reputation Policy * `authentik_policies.policybinding` - Policy Binding * `authentik_providers_ldap.ldapprovider` - LDAP Provider * `authentik_providers_oauth2.scopemapping` - Scope Mapping * `authentik_providers_oauth2.oauth2provider` - OAuth2/OpenID Provider * `authentik_providers_proxy.proxyprovider` - Proxy Provider * `authentik_providers_radius.radiusprovider` - Radius Provider * `authentik_providers_saml.samlprovider` - SAML Provider * `authentik_providers_saml.samlpropertymapping` - SAML Property Mapping * `authentik_providers_scim.scimprovider` - SCIM Provider * `authentik_providers_scim.scimmapping` - SCIM Mapping * `authentik_rbac.role` - Role * `authentik_sources_ldap.ldapsource` - LDAP Source * `authentik_sources_ldap.ldappropertymapping` - LDAP Property Mapping * `authentik_sources_oauth.oauthsource` - OAuth Source * `authentik_sources_oauth.useroauthsourceconnection` - User OAuth Source Connection * `authentik_sources_plex.plexsource` - Plex Source * `authentik_sources_plex.plexsourceconnection` - User Plex Source Connection * `authentik_sources_saml.samlsource` - SAML Source * `authentik_sources_saml.usersamlsourceconnection` - User SAML Source Connection * `authentik_stages_authenticator_duo.authenticatorduostage` - Duo Authenticator Setup Stage * `authentik_stages_authenticator_duo.duodevice` - Duo Device * `authentik_stages_authenticator_mobile.authenticatormobilestage` - Mobile Authenticator Setup Stage * `authentik_stages_authenticator_mobile.mobiledevice` - Mobile Device * `authentik_stages_authenticator_sms.authenticatorsmsstage` - SMS Authenticator Setup Stage * `authentik_stages_authenticator_sms.smsdevice` - SMS Device * `authentik_stages_authenticator_static.authenticatorstaticstage` - Static Authenticator Setup Stage * `authentik_stages_authenticator_static.staticdevice` - Static Device * `authentik_stages_authenticator_totp.authenticatortotpstage` - TOTP Authenticator Setup Stage * `authentik_stages_authenticator_totp.totpdevice` - TOTP Device * `authentik_stages_authenticator_validate.authenticatorvalidatestage` - Authenticator Validation Stage * `authentik_stages_authenticator_webauthn.authenticatewebauthnstage` - WebAuthn Authenticator Setup Stage * `authentik_stages_authenticator_webauthn.webauthndevice` - WebAuthn Device * `authentik_stages_captcha.captchastage` - Captcha Stage * `authentik_stages_consent.consentstage` - Consent Stage * `authentik_stages_consent.userconsent` - User Consent * `authentik_stages_deny.denystage` - Deny Stage * `authentik_stages_dummy.dummystage` - Dummy Stage * `authentik_stages_email.emailstage` - Email Stage * `authentik_stages_identification.identificationstage` - Identification Stage * `authentik_stages_invitation.invitationstage` - Invitation Stage * `authentik_stages_invitation.invitation` - Invitation * `authentik_stages_password.passwordstage` - Password Stage * `authentik_stages_prompt.prompt` - Prompt * `authentik_stages_prompt.promptstage` - Prompt Stage * `authentik_stages_user_delete.userdeletestage` - User Delete Stage * `authentik_stages_user_login.userloginstage` - User Login Stage * `authentik_stages_user_logout.userlogoutstage` - User Logout Stage * `authentik_stages_user_write.userwritestage` - User Write Stage * `authentik_brands.brand` - Brand * `authentik_blueprints.blueprintinstance` - Blueprint Instance * `authentik_core.group` - Group * `authentik_core.user` - User * `authentik_core.application` - Application * `authentik_core.token` - Token * `authentik_enterprise.license` - License * `authentik_providers_rac.racprovider` - RAC Provider * `authentik_providers_rac.endpoint` - RAC Endpoint * `authentik_providers_rac.racpropertymapping` - RAC Property Mapping * @param objectPk (optional) * @param ordering Which field to use when ordering the results. (optional) * @param page A page number within the paginated result set. (optional) diff --git a/src/main/kotlin/io/goauthentik/api/apis/StagesApi.kt b/src/main/kotlin/io/goauthentik/api/apis/StagesApi.kt index 31b7063..c153aa5 100644 --- a/src/main/kotlin/io/goauthentik/api/apis/StagesApi.kt +++ b/src/main/kotlin/io/goauthentik/api/apis/StagesApi.kt @@ -25,6 +25,8 @@ import io.goauthentik.api.models.AuthenticatorDuoStage import io.goauthentik.api.models.AuthenticatorDuoStageDeviceImportResponse import io.goauthentik.api.models.AuthenticatorDuoStageManualDeviceImportRequest import io.goauthentik.api.models.AuthenticatorDuoStageRequest +import io.goauthentik.api.models.AuthenticatorMobileStage +import io.goauthentik.api.models.AuthenticatorMobileStageRequest import io.goauthentik.api.models.AuthenticatorSMSStage import io.goauthentik.api.models.AuthenticatorSMSStageRequest import io.goauthentik.api.models.AuthenticatorStaticStage @@ -53,6 +55,7 @@ import io.goauthentik.api.models.InvitationStage import io.goauthentik.api.models.InvitationStageRequest import io.goauthentik.api.models.PaginatedAuthenticateWebAuthnStageList import io.goauthentik.api.models.PaginatedAuthenticatorDuoStageList +import io.goauthentik.api.models.PaginatedAuthenticatorMobileStageList import io.goauthentik.api.models.PaginatedAuthenticatorSMSStageList import io.goauthentik.api.models.PaginatedAuthenticatorStaticStageList import io.goauthentik.api.models.PaginatedAuthenticatorTOTPStageList @@ -77,6 +80,7 @@ import io.goauthentik.api.models.PasswordStage import io.goauthentik.api.models.PasswordStageRequest import io.goauthentik.api.models.PatchedAuthenticateWebAuthnStageRequest import io.goauthentik.api.models.PatchedAuthenticatorDuoStageRequest +import io.goauthentik.api.models.PatchedAuthenticatorMobileStageRequest import io.goauthentik.api.models.PatchedAuthenticatorSMSStageRequest import io.goauthentik.api.models.PatchedAuthenticatorStaticStageRequest import io.goauthentik.api.models.PatchedAuthenticatorTOTPStageRequest @@ -1352,6 +1356,545 @@ class StagesApi(basePath: kotlin.String = defaultBasePath, client: OkHttpClient ) } + /** + * + * AuthenticatorMobileStage Viewset + * @param authenticatorMobileStageRequest + * @return AuthenticatorMobileStage + * @throws IllegalStateException If the request is not correctly configured + * @throws IOException Rethrows the OkHttp execute method exception + * @throws UnsupportedOperationException If the API returns an informational or redirection response + * @throws ClientException If the API returns a client error response + * @throws ServerException If the API returns a server error response + */ + @Suppress("UNCHECKED_CAST") + @Throws(IllegalStateException::class, IOException::class, UnsupportedOperationException::class, ClientException::class, ServerException::class) + fun stagesAuthenticatorMobileCreate(authenticatorMobileStageRequest: AuthenticatorMobileStageRequest) : AuthenticatorMobileStage { + val localVarResponse = stagesAuthenticatorMobileCreateWithHttpInfo(authenticatorMobileStageRequest = authenticatorMobileStageRequest) + + return when (localVarResponse.responseType) { + ResponseType.Success -> (localVarResponse as Success<*>).data as AuthenticatorMobileStage + ResponseType.Informational -> throw UnsupportedOperationException("Client does not support Informational responses.") + ResponseType.Redirection -> throw UnsupportedOperationException("Client does not support Redirection responses.") + ResponseType.ClientError -> { + val localVarError = localVarResponse as ClientError<*> + throw ClientException("Client error : ${localVarError.statusCode} ${localVarError.message.orEmpty()}", localVarError.statusCode, localVarResponse) + } + ResponseType.ServerError -> { + val localVarError = localVarResponse as ServerError<*> + throw ServerException("Server error : ${localVarError.statusCode} ${localVarError.message.orEmpty()} ${localVarError.body}", localVarError.statusCode, localVarResponse) + } + } + } + + /** + * + * AuthenticatorMobileStage Viewset + * @param authenticatorMobileStageRequest + * @return ApiResponse + * @throws IllegalStateException If the request is not correctly configured + * @throws IOException Rethrows the OkHttp execute method exception + */ + @Suppress("UNCHECKED_CAST") + @Throws(IllegalStateException::class, IOException::class) + fun stagesAuthenticatorMobileCreateWithHttpInfo(authenticatorMobileStageRequest: AuthenticatorMobileStageRequest) : ApiResponse { + val localVariableConfig = stagesAuthenticatorMobileCreateRequestConfig(authenticatorMobileStageRequest = authenticatorMobileStageRequest) + + return request( + localVariableConfig + ) + } + + /** + * To obtain the request config of the operation stagesAuthenticatorMobileCreate + * + * @param authenticatorMobileStageRequest + * @return RequestConfig + */ + fun stagesAuthenticatorMobileCreateRequestConfig(authenticatorMobileStageRequest: AuthenticatorMobileStageRequest) : RequestConfig { + val localVariableBody = authenticatorMobileStageRequest + val localVariableQuery: MultiValueMap = mutableMapOf() + val localVariableHeaders: MutableMap = mutableMapOf() + localVariableHeaders["Content-Type"] = "application/json" + localVariableHeaders["Accept"] = "application/json" + + return RequestConfig( + method = RequestMethod.POST, + path = "/stages/authenticator/mobile/", + query = localVariableQuery, + headers = localVariableHeaders, + requiresAuthentication = true, + body = localVariableBody + ) + } + + /** + * + * AuthenticatorMobileStage Viewset + * @param stageUuid A UUID string identifying this Mobile Authenticator Setup Stage. + * @return void + * @throws IllegalStateException If the request is not correctly configured + * @throws IOException Rethrows the OkHttp execute method exception + * @throws UnsupportedOperationException If the API returns an informational or redirection response + * @throws ClientException If the API returns a client error response + * @throws ServerException If the API returns a server error response + */ + @Throws(IllegalStateException::class, IOException::class, UnsupportedOperationException::class, ClientException::class, ServerException::class) + fun stagesAuthenticatorMobileDestroy(stageUuid: java.util.UUID) : Unit { + val localVarResponse = stagesAuthenticatorMobileDestroyWithHttpInfo(stageUuid = stageUuid) + + return when (localVarResponse.responseType) { + ResponseType.Success -> Unit + ResponseType.Informational -> throw UnsupportedOperationException("Client does not support Informational responses.") + ResponseType.Redirection -> throw UnsupportedOperationException("Client does not support Redirection responses.") + ResponseType.ClientError -> { + val localVarError = localVarResponse as ClientError<*> + throw ClientException("Client error : ${localVarError.statusCode} ${localVarError.message.orEmpty()}", localVarError.statusCode, localVarResponse) + } + ResponseType.ServerError -> { + val localVarError = localVarResponse as ServerError<*> + throw ServerException("Server error : ${localVarError.statusCode} ${localVarError.message.orEmpty()} ${localVarError.body}", localVarError.statusCode, localVarResponse) + } + } + } + + /** + * + * AuthenticatorMobileStage Viewset + * @param stageUuid A UUID string identifying this Mobile Authenticator Setup Stage. + * @return ApiResponse + * @throws IllegalStateException If the request is not correctly configured + * @throws IOException Rethrows the OkHttp execute method exception + */ + @Throws(IllegalStateException::class, IOException::class) + fun stagesAuthenticatorMobileDestroyWithHttpInfo(stageUuid: java.util.UUID) : ApiResponse { + val localVariableConfig = stagesAuthenticatorMobileDestroyRequestConfig(stageUuid = stageUuid) + + return request( + localVariableConfig + ) + } + + /** + * To obtain the request config of the operation stagesAuthenticatorMobileDestroy + * + * @param stageUuid A UUID string identifying this Mobile Authenticator Setup Stage. + * @return RequestConfig + */ + fun stagesAuthenticatorMobileDestroyRequestConfig(stageUuid: java.util.UUID) : RequestConfig { + val localVariableBody = null + val localVariableQuery: MultiValueMap = mutableMapOf() + val localVariableHeaders: MutableMap = mutableMapOf() + localVariableHeaders["Accept"] = "application/json" + + return RequestConfig( + method = RequestMethod.DELETE, + path = "/stages/authenticator/mobile/{stage_uuid}/".replace("{"+"stage_uuid"+"}", encodeURIComponent(stageUuid.toString())), + query = localVariableQuery, + headers = localVariableHeaders, + requiresAuthentication = true, + body = localVariableBody + ) + } + + /** + * + * AuthenticatorMobileStage Viewset + * @param configureFlow (optional) + * @param name (optional) + * @param ordering Which field to use when ordering the results. (optional) + * @param page A page number within the paginated result set. (optional) + * @param pageSize Number of results to return per page. (optional) + * @param search A search term. (optional) + * @return PaginatedAuthenticatorMobileStageList + * @throws IllegalStateException If the request is not correctly configured + * @throws IOException Rethrows the OkHttp execute method exception + * @throws UnsupportedOperationException If the API returns an informational or redirection response + * @throws ClientException If the API returns a client error response + * @throws ServerException If the API returns a server error response + */ + @Suppress("UNCHECKED_CAST") + @Throws(IllegalStateException::class, IOException::class, UnsupportedOperationException::class, ClientException::class, ServerException::class) + fun stagesAuthenticatorMobileList(configureFlow: java.util.UUID? = null, name: kotlin.String? = null, ordering: kotlin.String? = null, page: kotlin.Int? = null, pageSize: kotlin.Int? = null, search: kotlin.String? = null) : PaginatedAuthenticatorMobileStageList { + val localVarResponse = stagesAuthenticatorMobileListWithHttpInfo(configureFlow = configureFlow, name = name, ordering = ordering, page = page, pageSize = pageSize, search = search) + + return when (localVarResponse.responseType) { + ResponseType.Success -> (localVarResponse as Success<*>).data as PaginatedAuthenticatorMobileStageList + ResponseType.Informational -> throw UnsupportedOperationException("Client does not support Informational responses.") + ResponseType.Redirection -> throw UnsupportedOperationException("Client does not support Redirection responses.") + ResponseType.ClientError -> { + val localVarError = localVarResponse as ClientError<*> + throw ClientException("Client error : ${localVarError.statusCode} ${localVarError.message.orEmpty()}", localVarError.statusCode, localVarResponse) + } + ResponseType.ServerError -> { + val localVarError = localVarResponse as ServerError<*> + throw ServerException("Server error : ${localVarError.statusCode} ${localVarError.message.orEmpty()} ${localVarError.body}", localVarError.statusCode, localVarResponse) + } + } + } + + /** + * + * AuthenticatorMobileStage Viewset + * @param configureFlow (optional) + * @param name (optional) + * @param ordering Which field to use when ordering the results. (optional) + * @param page A page number within the paginated result set. (optional) + * @param pageSize Number of results to return per page. (optional) + * @param search A search term. (optional) + * @return ApiResponse + * @throws IllegalStateException If the request is not correctly configured + * @throws IOException Rethrows the OkHttp execute method exception + */ + @Suppress("UNCHECKED_CAST") + @Throws(IllegalStateException::class, IOException::class) + fun stagesAuthenticatorMobileListWithHttpInfo(configureFlow: java.util.UUID?, name: kotlin.String?, ordering: kotlin.String?, page: kotlin.Int?, pageSize: kotlin.Int?, search: kotlin.String?) : ApiResponse { + val localVariableConfig = stagesAuthenticatorMobileListRequestConfig(configureFlow = configureFlow, name = name, ordering = ordering, page = page, pageSize = pageSize, search = search) + + return request( + localVariableConfig + ) + } + + /** + * To obtain the request config of the operation stagesAuthenticatorMobileList + * + * @param configureFlow (optional) + * @param name (optional) + * @param ordering Which field to use when ordering the results. (optional) + * @param page A page number within the paginated result set. (optional) + * @param pageSize Number of results to return per page. (optional) + * @param search A search term. (optional) + * @return RequestConfig + */ + fun stagesAuthenticatorMobileListRequestConfig(configureFlow: java.util.UUID?, name: kotlin.String?, ordering: kotlin.String?, page: kotlin.Int?, pageSize: kotlin.Int?, search: kotlin.String?) : RequestConfig { + val localVariableBody = null + val localVariableQuery: MultiValueMap = mutableMapOf>() + .apply { + if (configureFlow != null) { + put("configure_flow", listOf(configureFlow.toString())) + } + if (name != null) { + put("name", listOf(name.toString())) + } + if (ordering != null) { + put("ordering", listOf(ordering.toString())) + } + if (page != null) { + put("page", listOf(page.toString())) + } + if (pageSize != null) { + put("page_size", listOf(pageSize.toString())) + } + if (search != null) { + put("search", listOf(search.toString())) + } + } + val localVariableHeaders: MutableMap = mutableMapOf() + localVariableHeaders["Accept"] = "application/json" + + return RequestConfig( + method = RequestMethod.GET, + path = "/stages/authenticator/mobile/", + query = localVariableQuery, + headers = localVariableHeaders, + requiresAuthentication = true, + body = localVariableBody + ) + } + + /** + * + * AuthenticatorMobileStage Viewset + * @param stageUuid A UUID string identifying this Mobile Authenticator Setup Stage. + * @param patchedAuthenticatorMobileStageRequest (optional) + * @return AuthenticatorMobileStage + * @throws IllegalStateException If the request is not correctly configured + * @throws IOException Rethrows the OkHttp execute method exception + * @throws UnsupportedOperationException If the API returns an informational or redirection response + * @throws ClientException If the API returns a client error response + * @throws ServerException If the API returns a server error response + */ + @Suppress("UNCHECKED_CAST") + @Throws(IllegalStateException::class, IOException::class, UnsupportedOperationException::class, ClientException::class, ServerException::class) + fun stagesAuthenticatorMobilePartialUpdate(stageUuid: java.util.UUID, patchedAuthenticatorMobileStageRequest: PatchedAuthenticatorMobileStageRequest? = null) : AuthenticatorMobileStage { + val localVarResponse = stagesAuthenticatorMobilePartialUpdateWithHttpInfo(stageUuid = stageUuid, patchedAuthenticatorMobileStageRequest = patchedAuthenticatorMobileStageRequest) + + return when (localVarResponse.responseType) { + ResponseType.Success -> (localVarResponse as Success<*>).data as AuthenticatorMobileStage + ResponseType.Informational -> throw UnsupportedOperationException("Client does not support Informational responses.") + ResponseType.Redirection -> throw UnsupportedOperationException("Client does not support Redirection responses.") + ResponseType.ClientError -> { + val localVarError = localVarResponse as ClientError<*> + throw ClientException("Client error : ${localVarError.statusCode} ${localVarError.message.orEmpty()}", localVarError.statusCode, localVarResponse) + } + ResponseType.ServerError -> { + val localVarError = localVarResponse as ServerError<*> + throw ServerException("Server error : ${localVarError.statusCode} ${localVarError.message.orEmpty()} ${localVarError.body}", localVarError.statusCode, localVarResponse) + } + } + } + + /** + * + * AuthenticatorMobileStage Viewset + * @param stageUuid A UUID string identifying this Mobile Authenticator Setup Stage. + * @param patchedAuthenticatorMobileStageRequest (optional) + * @return ApiResponse + * @throws IllegalStateException If the request is not correctly configured + * @throws IOException Rethrows the OkHttp execute method exception + */ + @Suppress("UNCHECKED_CAST") + @Throws(IllegalStateException::class, IOException::class) + fun stagesAuthenticatorMobilePartialUpdateWithHttpInfo(stageUuid: java.util.UUID, patchedAuthenticatorMobileStageRequest: PatchedAuthenticatorMobileStageRequest?) : ApiResponse { + val localVariableConfig = stagesAuthenticatorMobilePartialUpdateRequestConfig(stageUuid = stageUuid, patchedAuthenticatorMobileStageRequest = patchedAuthenticatorMobileStageRequest) + + return request( + localVariableConfig + ) + } + + /** + * To obtain the request config of the operation stagesAuthenticatorMobilePartialUpdate + * + * @param stageUuid A UUID string identifying this Mobile Authenticator Setup Stage. + * @param patchedAuthenticatorMobileStageRequest (optional) + * @return RequestConfig + */ + fun stagesAuthenticatorMobilePartialUpdateRequestConfig(stageUuid: java.util.UUID, patchedAuthenticatorMobileStageRequest: PatchedAuthenticatorMobileStageRequest?) : RequestConfig { + val localVariableBody = patchedAuthenticatorMobileStageRequest + val localVariableQuery: MultiValueMap = mutableMapOf() + val localVariableHeaders: MutableMap = mutableMapOf() + localVariableHeaders["Content-Type"] = "application/json" + localVariableHeaders["Accept"] = "application/json" + + return RequestConfig( + method = RequestMethod.PATCH, + path = "/stages/authenticator/mobile/{stage_uuid}/".replace("{"+"stage_uuid"+"}", encodeURIComponent(stageUuid.toString())), + query = localVariableQuery, + headers = localVariableHeaders, + requiresAuthentication = true, + body = localVariableBody + ) + } + + /** + * + * AuthenticatorMobileStage Viewset + * @param stageUuid A UUID string identifying this Mobile Authenticator Setup Stage. + * @return AuthenticatorMobileStage + * @throws IllegalStateException If the request is not correctly configured + * @throws IOException Rethrows the OkHttp execute method exception + * @throws UnsupportedOperationException If the API returns an informational or redirection response + * @throws ClientException If the API returns a client error response + * @throws ServerException If the API returns a server error response + */ + @Suppress("UNCHECKED_CAST") + @Throws(IllegalStateException::class, IOException::class, UnsupportedOperationException::class, ClientException::class, ServerException::class) + fun stagesAuthenticatorMobileRetrieve(stageUuid: java.util.UUID) : AuthenticatorMobileStage { + val localVarResponse = stagesAuthenticatorMobileRetrieveWithHttpInfo(stageUuid = stageUuid) + + return when (localVarResponse.responseType) { + ResponseType.Success -> (localVarResponse as Success<*>).data as AuthenticatorMobileStage + ResponseType.Informational -> throw UnsupportedOperationException("Client does not support Informational responses.") + ResponseType.Redirection -> throw UnsupportedOperationException("Client does not support Redirection responses.") + ResponseType.ClientError -> { + val localVarError = localVarResponse as ClientError<*> + throw ClientException("Client error : ${localVarError.statusCode} ${localVarError.message.orEmpty()}", localVarError.statusCode, localVarResponse) + } + ResponseType.ServerError -> { + val localVarError = localVarResponse as ServerError<*> + throw ServerException("Server error : ${localVarError.statusCode} ${localVarError.message.orEmpty()} ${localVarError.body}", localVarError.statusCode, localVarResponse) + } + } + } + + /** + * + * AuthenticatorMobileStage Viewset + * @param stageUuid A UUID string identifying this Mobile Authenticator Setup Stage. + * @return ApiResponse + * @throws IllegalStateException If the request is not correctly configured + * @throws IOException Rethrows the OkHttp execute method exception + */ + @Suppress("UNCHECKED_CAST") + @Throws(IllegalStateException::class, IOException::class) + fun stagesAuthenticatorMobileRetrieveWithHttpInfo(stageUuid: java.util.UUID) : ApiResponse { + val localVariableConfig = stagesAuthenticatorMobileRetrieveRequestConfig(stageUuid = stageUuid) + + return request( + localVariableConfig + ) + } + + /** + * To obtain the request config of the operation stagesAuthenticatorMobileRetrieve + * + * @param stageUuid A UUID string identifying this Mobile Authenticator Setup Stage. + * @return RequestConfig + */ + fun stagesAuthenticatorMobileRetrieveRequestConfig(stageUuid: java.util.UUID) : RequestConfig { + val localVariableBody = null + val localVariableQuery: MultiValueMap = mutableMapOf() + val localVariableHeaders: MutableMap = mutableMapOf() + localVariableHeaders["Accept"] = "application/json" + + return RequestConfig( + method = RequestMethod.GET, + path = "/stages/authenticator/mobile/{stage_uuid}/".replace("{"+"stage_uuid"+"}", encodeURIComponent(stageUuid.toString())), + query = localVariableQuery, + headers = localVariableHeaders, + requiresAuthentication = true, + body = localVariableBody + ) + } + + /** + * + * AuthenticatorMobileStage Viewset + * @param stageUuid A UUID string identifying this Mobile Authenticator Setup Stage. + * @param authenticatorMobileStageRequest + * @return AuthenticatorMobileStage + * @throws IllegalStateException If the request is not correctly configured + * @throws IOException Rethrows the OkHttp execute method exception + * @throws UnsupportedOperationException If the API returns an informational or redirection response + * @throws ClientException If the API returns a client error response + * @throws ServerException If the API returns a server error response + */ + @Suppress("UNCHECKED_CAST") + @Throws(IllegalStateException::class, IOException::class, UnsupportedOperationException::class, ClientException::class, ServerException::class) + fun stagesAuthenticatorMobileUpdate(stageUuid: java.util.UUID, authenticatorMobileStageRequest: AuthenticatorMobileStageRequest) : AuthenticatorMobileStage { + val localVarResponse = stagesAuthenticatorMobileUpdateWithHttpInfo(stageUuid = stageUuid, authenticatorMobileStageRequest = authenticatorMobileStageRequest) + + return when (localVarResponse.responseType) { + ResponseType.Success -> (localVarResponse as Success<*>).data as AuthenticatorMobileStage + ResponseType.Informational -> throw UnsupportedOperationException("Client does not support Informational responses.") + ResponseType.Redirection -> throw UnsupportedOperationException("Client does not support Redirection responses.") + ResponseType.ClientError -> { + val localVarError = localVarResponse as ClientError<*> + throw ClientException("Client error : ${localVarError.statusCode} ${localVarError.message.orEmpty()}", localVarError.statusCode, localVarResponse) + } + ResponseType.ServerError -> { + val localVarError = localVarResponse as ServerError<*> + throw ServerException("Server error : ${localVarError.statusCode} ${localVarError.message.orEmpty()} ${localVarError.body}", localVarError.statusCode, localVarResponse) + } + } + } + + /** + * + * AuthenticatorMobileStage Viewset + * @param stageUuid A UUID string identifying this Mobile Authenticator Setup Stage. + * @param authenticatorMobileStageRequest + * @return ApiResponse + * @throws IllegalStateException If the request is not correctly configured + * @throws IOException Rethrows the OkHttp execute method exception + */ + @Suppress("UNCHECKED_CAST") + @Throws(IllegalStateException::class, IOException::class) + fun stagesAuthenticatorMobileUpdateWithHttpInfo(stageUuid: java.util.UUID, authenticatorMobileStageRequest: AuthenticatorMobileStageRequest) : ApiResponse { + val localVariableConfig = stagesAuthenticatorMobileUpdateRequestConfig(stageUuid = stageUuid, authenticatorMobileStageRequest = authenticatorMobileStageRequest) + + return request( + localVariableConfig + ) + } + + /** + * To obtain the request config of the operation stagesAuthenticatorMobileUpdate + * + * @param stageUuid A UUID string identifying this Mobile Authenticator Setup Stage. + * @param authenticatorMobileStageRequest + * @return RequestConfig + */ + fun stagesAuthenticatorMobileUpdateRequestConfig(stageUuid: java.util.UUID, authenticatorMobileStageRequest: AuthenticatorMobileStageRequest) : RequestConfig { + val localVariableBody = authenticatorMobileStageRequest + val localVariableQuery: MultiValueMap = mutableMapOf() + val localVariableHeaders: MutableMap = mutableMapOf() + localVariableHeaders["Content-Type"] = "application/json" + localVariableHeaders["Accept"] = "application/json" + + return RequestConfig( + method = RequestMethod.PUT, + path = "/stages/authenticator/mobile/{stage_uuid}/".replace("{"+"stage_uuid"+"}", encodeURIComponent(stageUuid.toString())), + query = localVariableQuery, + headers = localVariableHeaders, + requiresAuthentication = true, + body = localVariableBody + ) + } + + /** + * + * Get a list of all objects that use this object + * @param stageUuid A UUID string identifying this Mobile Authenticator Setup Stage. + * @return kotlin.collections.List + * @throws IllegalStateException If the request is not correctly configured + * @throws IOException Rethrows the OkHttp execute method exception + * @throws UnsupportedOperationException If the API returns an informational or redirection response + * @throws ClientException If the API returns a client error response + * @throws ServerException If the API returns a server error response + */ + @Suppress("UNCHECKED_CAST") + @Throws(IllegalStateException::class, IOException::class, UnsupportedOperationException::class, ClientException::class, ServerException::class) + fun stagesAuthenticatorMobileUsedByList(stageUuid: java.util.UUID) : kotlin.collections.List { + val localVarResponse = stagesAuthenticatorMobileUsedByListWithHttpInfo(stageUuid = stageUuid) + + return when (localVarResponse.responseType) { + ResponseType.Success -> (localVarResponse as Success<*>).data as kotlin.collections.List + ResponseType.Informational -> throw UnsupportedOperationException("Client does not support Informational responses.") + ResponseType.Redirection -> throw UnsupportedOperationException("Client does not support Redirection responses.") + ResponseType.ClientError -> { + val localVarError = localVarResponse as ClientError<*> + throw ClientException("Client error : ${localVarError.statusCode} ${localVarError.message.orEmpty()}", localVarError.statusCode, localVarResponse) + } + ResponseType.ServerError -> { + val localVarError = localVarResponse as ServerError<*> + throw ServerException("Server error : ${localVarError.statusCode} ${localVarError.message.orEmpty()} ${localVarError.body}", localVarError.statusCode, localVarResponse) + } + } + } + + /** + * + * Get a list of all objects that use this object + * @param stageUuid A UUID string identifying this Mobile Authenticator Setup Stage. + * @return ApiResponse?> + * @throws IllegalStateException If the request is not correctly configured + * @throws IOException Rethrows the OkHttp execute method exception + */ + @Suppress("UNCHECKED_CAST") + @Throws(IllegalStateException::class, IOException::class) + fun stagesAuthenticatorMobileUsedByListWithHttpInfo(stageUuid: java.util.UUID) : ApiResponse?> { + val localVariableConfig = stagesAuthenticatorMobileUsedByListRequestConfig(stageUuid = stageUuid) + + return request>( + localVariableConfig + ) + } + + /** + * To obtain the request config of the operation stagesAuthenticatorMobileUsedByList + * + * @param stageUuid A UUID string identifying this Mobile Authenticator Setup Stage. + * @return RequestConfig + */ + fun stagesAuthenticatorMobileUsedByListRequestConfig(stageUuid: java.util.UUID) : RequestConfig { + val localVariableBody = null + val localVariableQuery: MultiValueMap = mutableMapOf() + val localVariableHeaders: MutableMap = mutableMapOf() + localVariableHeaders["Accept"] = "application/json" + + return RequestConfig( + method = RequestMethod.GET, + path = "/stages/authenticator/mobile/{stage_uuid}/used_by/".replace("{"+"stage_uuid"+"}", encodeURIComponent(stageUuid.toString())), + query = localVariableQuery, + headers = localVariableHeaders, + requiresAuthentication = true, + body = localVariableBody + ) + } + /** * * AuthenticatorSMSStage Viewset @@ -2042,7 +2585,7 @@ class StagesApi(basePath: kotlin.String = defaultBasePath, client: OkHttpClient /** * * AuthenticatorStaticStage Viewset - * @param stageUuid A UUID string identifying this Static Authenticator Stage. + * @param stageUuid A UUID string identifying this Static Authenticator Setup Stage. * @return void * @throws IllegalStateException If the request is not correctly configured * @throws IOException Rethrows the OkHttp execute method exception @@ -2072,7 +2615,7 @@ class StagesApi(basePath: kotlin.String = defaultBasePath, client: OkHttpClient /** * * AuthenticatorStaticStage Viewset - * @param stageUuid A UUID string identifying this Static Authenticator Stage. + * @param stageUuid A UUID string identifying this Static Authenticator Setup Stage. * @return ApiResponse * @throws IllegalStateException If the request is not correctly configured * @throws IOException Rethrows the OkHttp execute method exception @@ -2089,7 +2632,7 @@ class StagesApi(basePath: kotlin.String = defaultBasePath, client: OkHttpClient /** * To obtain the request config of the operation stagesAuthenticatorStaticDestroy * - * @param stageUuid A UUID string identifying this Static Authenticator Stage. + * @param stageUuid A UUID string identifying this Static Authenticator Setup Stage. * @return RequestConfig */ fun stagesAuthenticatorStaticDestroyRequestConfig(stageUuid: java.util.UUID) : RequestConfig { @@ -2241,7 +2784,7 @@ class StagesApi(basePath: kotlin.String = defaultBasePath, client: OkHttpClient /** * * AuthenticatorStaticStage Viewset - * @param stageUuid A UUID string identifying this Static Authenticator Stage. + * @param stageUuid A UUID string identifying this Static Authenticator Setup Stage. * @param patchedAuthenticatorStaticStageRequest (optional) * @return AuthenticatorStaticStage * @throws IllegalStateException If the request is not correctly configured @@ -2273,7 +2816,7 @@ class StagesApi(basePath: kotlin.String = defaultBasePath, client: OkHttpClient /** * * AuthenticatorStaticStage Viewset - * @param stageUuid A UUID string identifying this Static Authenticator Stage. + * @param stageUuid A UUID string identifying this Static Authenticator Setup Stage. * @param patchedAuthenticatorStaticStageRequest (optional) * @return ApiResponse * @throws IllegalStateException If the request is not correctly configured @@ -2292,7 +2835,7 @@ class StagesApi(basePath: kotlin.String = defaultBasePath, client: OkHttpClient /** * To obtain the request config of the operation stagesAuthenticatorStaticPartialUpdate * - * @param stageUuid A UUID string identifying this Static Authenticator Stage. + * @param stageUuid A UUID string identifying this Static Authenticator Setup Stage. * @param patchedAuthenticatorStaticStageRequest (optional) * @return RequestConfig */ @@ -2316,7 +2859,7 @@ class StagesApi(basePath: kotlin.String = defaultBasePath, client: OkHttpClient /** * * AuthenticatorStaticStage Viewset - * @param stageUuid A UUID string identifying this Static Authenticator Stage. + * @param stageUuid A UUID string identifying this Static Authenticator Setup Stage. * @return AuthenticatorStaticStage * @throws IllegalStateException If the request is not correctly configured * @throws IOException Rethrows the OkHttp execute method exception @@ -2347,7 +2890,7 @@ class StagesApi(basePath: kotlin.String = defaultBasePath, client: OkHttpClient /** * * AuthenticatorStaticStage Viewset - * @param stageUuid A UUID string identifying this Static Authenticator Stage. + * @param stageUuid A UUID string identifying this Static Authenticator Setup Stage. * @return ApiResponse * @throws IllegalStateException If the request is not correctly configured * @throws IOException Rethrows the OkHttp execute method exception @@ -2365,7 +2908,7 @@ class StagesApi(basePath: kotlin.String = defaultBasePath, client: OkHttpClient /** * To obtain the request config of the operation stagesAuthenticatorStaticRetrieve * - * @param stageUuid A UUID string identifying this Static Authenticator Stage. + * @param stageUuid A UUID string identifying this Static Authenticator Setup Stage. * @return RequestConfig */ fun stagesAuthenticatorStaticRetrieveRequestConfig(stageUuid: java.util.UUID) : RequestConfig { @@ -2387,7 +2930,7 @@ class StagesApi(basePath: kotlin.String = defaultBasePath, client: OkHttpClient /** * * AuthenticatorStaticStage Viewset - * @param stageUuid A UUID string identifying this Static Authenticator Stage. + * @param stageUuid A UUID string identifying this Static Authenticator Setup Stage. * @param authenticatorStaticStageRequest * @return AuthenticatorStaticStage * @throws IllegalStateException If the request is not correctly configured @@ -2419,7 +2962,7 @@ class StagesApi(basePath: kotlin.String = defaultBasePath, client: OkHttpClient /** * * AuthenticatorStaticStage Viewset - * @param stageUuid A UUID string identifying this Static Authenticator Stage. + * @param stageUuid A UUID string identifying this Static Authenticator Setup Stage. * @param authenticatorStaticStageRequest * @return ApiResponse * @throws IllegalStateException If the request is not correctly configured @@ -2438,7 +2981,7 @@ class StagesApi(basePath: kotlin.String = defaultBasePath, client: OkHttpClient /** * To obtain the request config of the operation stagesAuthenticatorStaticUpdate * - * @param stageUuid A UUID string identifying this Static Authenticator Stage. + * @param stageUuid A UUID string identifying this Static Authenticator Setup Stage. * @param authenticatorStaticStageRequest * @return RequestConfig */ @@ -2462,7 +3005,7 @@ class StagesApi(basePath: kotlin.String = defaultBasePath, client: OkHttpClient /** * * Get a list of all objects that use this object - * @param stageUuid A UUID string identifying this Static Authenticator Stage. + * @param stageUuid A UUID string identifying this Static Authenticator Setup Stage. * @return kotlin.collections.List * @throws IllegalStateException If the request is not correctly configured * @throws IOException Rethrows the OkHttp execute method exception @@ -2493,7 +3036,7 @@ class StagesApi(basePath: kotlin.String = defaultBasePath, client: OkHttpClient /** * * Get a list of all objects that use this object - * @param stageUuid A UUID string identifying this Static Authenticator Stage. + * @param stageUuid A UUID string identifying this Static Authenticator Setup Stage. * @return ApiResponse?> * @throws IllegalStateException If the request is not correctly configured * @throws IOException Rethrows the OkHttp execute method exception @@ -2511,7 +3054,7 @@ class StagesApi(basePath: kotlin.String = defaultBasePath, client: OkHttpClient /** * To obtain the request config of the operation stagesAuthenticatorStaticUsedByList * - * @param stageUuid A UUID string identifying this Static Authenticator Stage. + * @param stageUuid A UUID string identifying this Static Authenticator Setup Stage. * @return RequestConfig */ fun stagesAuthenticatorStaticUsedByListRequestConfig(stageUuid: java.util.UUID) : RequestConfig { diff --git a/src/main/kotlin/io/goauthentik/api/infrastructure/ApiClient.kt b/src/main/kotlin/io/goauthentik/api/infrastructure/ApiClient.kt index 3604623..a483561 100644 --- a/src/main/kotlin/io/goauthentik/api/infrastructure/ApiClient.kt +++ b/src/main/kotlin/io/goauthentik/api/infrastructure/ApiClient.kt @@ -159,6 +159,15 @@ open class ApiClient(val baseUrl: String, val client: OkHttpClient = defaultClie } } } + if (requestConfig.headers["Authorization"].isNullOrEmpty()) { + if (apiKey["Authorization"] != null) { + if (apiKeyPrefix["Authorization"] != null) { + requestConfig.headers["Authorization"] = apiKeyPrefix["Authorization"]!! + " " + apiKey["Authorization"]!! + } else { + requestConfig.headers["Authorization"] = apiKey["Authorization"]!! + } + } + } } protected inline fun request(requestConfig: RequestConfig): ApiResponse { diff --git a/src/main/kotlin/io/goauthentik/api/infrastructure/SerializerHelper.kt b/src/main/kotlin/io/goauthentik/api/infrastructure/SerializerHelper.kt index 680004d..22470fb 100644 --- a/src/main/kotlin/io/goauthentik/api/infrastructure/SerializerHelper.kt +++ b/src/main/kotlin/io/goauthentik/api/infrastructure/SerializerHelper.kt @@ -56,8 +56,12 @@ object SerializerHelper { .withUnknownFallback(io.goauthentik.api.models.InvalidResponseActionEnum.unknownDefaultOpenApi)) .add(io.goauthentik.api.models.IssuerModeEnum::class.java, EnumJsonAdapter.create(io.goauthentik.api.models.IssuerModeEnum::class.java) .withUnknownFallback(io.goauthentik.api.models.IssuerModeEnum.unknownDefaultOpenApi)) + .add(io.goauthentik.api.models.ItemMatchingModeEnum::class.java, EnumJsonAdapter.create(io.goauthentik.api.models.ItemMatchingModeEnum::class.java) + .withUnknownFallback(io.goauthentik.api.models.ItemMatchingModeEnum.unknownDefaultOpenApi)) .add(io.goauthentik.api.models.LDAPAPIAccessMode::class.java, EnumJsonAdapter.create(io.goauthentik.api.models.LDAPAPIAccessMode::class.java) .withUnknownFallback(io.goauthentik.api.models.LDAPAPIAccessMode.unknownDefaultOpenApi)) + .add(io.goauthentik.api.models.MobileDeviceEnrollmentStatusStatusEnum::class.java, EnumJsonAdapter.create(io.goauthentik.api.models.MobileDeviceEnrollmentStatusStatusEnum::class.java) + .withUnknownFallback(io.goauthentik.api.models.MobileDeviceEnrollmentStatusStatusEnum.unknownDefaultOpenApi)) .add(io.goauthentik.api.models.ModelEnum::class.java, EnumJsonAdapter.create(io.goauthentik.api.models.ModelEnum::class.java) .withUnknownFallback(io.goauthentik.api.models.ModelEnum.unknownDefaultOpenApi)) .add(io.goauthentik.api.models.NameIdPolicyEnum::class.java, EnumJsonAdapter.create(io.goauthentik.api.models.NameIdPolicyEnum::class.java) @@ -70,6 +74,8 @@ object SerializerHelper { .withUnknownFallback(io.goauthentik.api.models.NotificationTransportModeEnum.unknownDefaultOpenApi)) .add(io.goauthentik.api.models.OutpostTypeEnum::class.java, EnumJsonAdapter.create(io.goauthentik.api.models.OutpostTypeEnum::class.java) .withUnknownFallback(io.goauthentik.api.models.OutpostTypeEnum.unknownDefaultOpenApi)) + .add(io.goauthentik.api.models.PlatformEnum::class.java, EnumJsonAdapter.create(io.goauthentik.api.models.PlatformEnum::class.java) + .withUnknownFallback(io.goauthentik.api.models.PlatformEnum.unknownDefaultOpenApi)) .add(io.goauthentik.api.models.PolicyEngineMode::class.java, EnumJsonAdapter.create(io.goauthentik.api.models.PolicyEngineMode::class.java) .withUnknownFallback(io.goauthentik.api.models.PolicyEngineMode.unknownDefaultOpenApi)) .add(io.goauthentik.api.models.PromptTypeEnum::class.java, EnumJsonAdapter.create(io.goauthentik.api.models.PromptTypeEnum::class.java) @@ -94,8 +100,8 @@ object SerializerHelper { .withUnknownFallback(io.goauthentik.api.models.SpBindingEnum.unknownDefaultOpenApi)) .add(io.goauthentik.api.models.SubModeEnum::class.java, EnumJsonAdapter.create(io.goauthentik.api.models.SubModeEnum::class.java) .withUnknownFallback(io.goauthentik.api.models.SubModeEnum.unknownDefaultOpenApi)) - .add(io.goauthentik.api.models.TaskStatusEnum::class.java, EnumJsonAdapter.create(io.goauthentik.api.models.TaskStatusEnum::class.java) - .withUnknownFallback(io.goauthentik.api.models.TaskStatusEnum.unknownDefaultOpenApi)) + .add(io.goauthentik.api.models.SystemTaskStatusEnum::class.java, EnumJsonAdapter.create(io.goauthentik.api.models.SystemTaskStatusEnum::class.java) + .withUnknownFallback(io.goauthentik.api.models.SystemTaskStatusEnum.unknownDefaultOpenApi)) .add(io.goauthentik.api.models.UiThemeEnum::class.java, EnumJsonAdapter.create(io.goauthentik.api.models.UiThemeEnum::class.java) .withUnknownFallback(io.goauthentik.api.models.UiThemeEnum.unknownDefaultOpenApi)) .add(io.goauthentik.api.models.UsedByActionEnum::class.java, EnumJsonAdapter.create(io.goauthentik.api.models.UsedByActionEnum::class.java) diff --git a/src/main/kotlin/io/goauthentik/api/models/AppEnum.kt b/src/main/kotlin/io/goauthentik/api/models/AppEnum.kt index 88ee9f3..797fef6 100644 --- a/src/main/kotlin/io/goauthentik/api/models/AppEnum.kt +++ b/src/main/kotlin/io/goauthentik/api/models/AppEnum.kt @@ -20,9 +20,9 @@ import com.squareup.moshi.Json import com.squareup.moshi.JsonClass /** - * * `authentik.tenants` - authentik Tenants * `authentik.admin` - authentik Admin * `authentik.api` - authentik API * `authentik.crypto` - authentik Crypto * `authentik.events` - authentik Events * `authentik.flows` - authentik Flows * `authentik.outposts` - authentik Outpost * `authentik.policies.dummy` - authentik Policies.Dummy * `authentik.policies.event_matcher` - authentik Policies.Event Matcher * `authentik.policies.expiry` - authentik Policies.Expiry * `authentik.policies.expression` - authentik Policies.Expression * `authentik.policies.password` - authentik Policies.Password * `authentik.policies.reputation` - authentik Policies.Reputation * `authentik.policies` - authentik Policies * `authentik.providers.ldap` - authentik Providers.LDAP * `authentik.providers.oauth2` - authentik Providers.OAuth2 * `authentik.providers.proxy` - authentik Providers.Proxy * `authentik.providers.radius` - authentik Providers.Radius * `authentik.providers.saml` - authentik Providers.SAML * `authentik.providers.scim` - authentik Providers.SCIM * `authentik.rbac` - authentik RBAC * `authentik.recovery` - authentik Recovery * `authentik.sources.ldap` - authentik Sources.LDAP * `authentik.sources.oauth` - authentik Sources.OAuth * `authentik.sources.plex` - authentik Sources.Plex * `authentik.sources.saml` - authentik Sources.SAML * `authentik.stages.authenticator` - authentik Stages.Authenticator * `authentik.stages.authenticator_duo` - authentik Stages.Authenticator.Duo * `authentik.stages.authenticator_sms` - authentik Stages.Authenticator.SMS * `authentik.stages.authenticator_static` - authentik Stages.Authenticator.Static * `authentik.stages.authenticator_totp` - authentik Stages.Authenticator.TOTP * `authentik.stages.authenticator_validate` - authentik Stages.Authenticator.Validate * `authentik.stages.authenticator_webauthn` - authentik Stages.Authenticator.WebAuthn * `authentik.stages.captcha` - authentik Stages.Captcha * `authentik.stages.consent` - authentik Stages.Consent * `authentik.stages.deny` - authentik Stages.Deny * `authentik.stages.dummy` - authentik Stages.Dummy * `authentik.stages.email` - authentik Stages.Email * `authentik.stages.identification` - authentik Stages.Identification * `authentik.stages.invitation` - authentik Stages.User Invitation * `authentik.stages.password` - authentik Stages.Password * `authentik.stages.prompt` - authentik Stages.Prompt * `authentik.stages.user_delete` - authentik Stages.User Delete * `authentik.stages.user_login` - authentik Stages.User Login * `authentik.stages.user_logout` - authentik Stages.User Logout * `authentik.stages.user_write` - authentik Stages.User Write * `authentik.brands` - authentik Brands * `authentik.blueprints` - authentik Blueprints * `authentik.core` - authentik Core * `authentik.enterprise` - authentik Enterprise * `authentik.enterprise.audit` - authentik Enterprise.Audit * `authentik.enterprise.providers.rac` - authentik Enterprise.Providers.RAC + * * `authentik.tenants` - authentik Tenants * `authentik.admin` - authentik Admin * `authentik.api` - authentik API * `authentik.crypto` - authentik Crypto * `authentik.events` - authentik Events * `authentik.flows` - authentik Flows * `authentik.outposts` - authentik Outpost * `authentik.policies.dummy` - authentik Policies.Dummy * `authentik.policies.event_matcher` - authentik Policies.Event Matcher * `authentik.policies.expiry` - authentik Policies.Expiry * `authentik.policies.expression` - authentik Policies.Expression * `authentik.policies.password` - authentik Policies.Password * `authentik.policies.reputation` - authentik Policies.Reputation * `authentik.policies` - authentik Policies * `authentik.providers.ldap` - authentik Providers.LDAP * `authentik.providers.oauth2` - authentik Providers.OAuth2 * `authentik.providers.proxy` - authentik Providers.Proxy * `authentik.providers.radius` - authentik Providers.Radius * `authentik.providers.saml` - authentik Providers.SAML * `authentik.providers.scim` - authentik Providers.SCIM * `authentik.rbac` - authentik RBAC * `authentik.recovery` - authentik Recovery * `authentik.sources.ldap` - authentik Sources.LDAP * `authentik.sources.oauth` - authentik Sources.OAuth * `authentik.sources.plex` - authentik Sources.Plex * `authentik.sources.saml` - authentik Sources.SAML * `authentik.stages.authenticator` - authentik Stages.Authenticator * `authentik.stages.authenticator_duo` - authentik Stages.Authenticator.Duo * `authentik.stages.authenticator_mobile` - authentik Stages.Authenticator.Mobile * `authentik.stages.authenticator_sms` - authentik Stages.Authenticator.SMS * `authentik.stages.authenticator_static` - authentik Stages.Authenticator.Static * `authentik.stages.authenticator_totp` - authentik Stages.Authenticator.TOTP * `authentik.stages.authenticator_validate` - authentik Stages.Authenticator.Validate * `authentik.stages.authenticator_webauthn` - authentik Stages.Authenticator.WebAuthn * `authentik.stages.captcha` - authentik Stages.Captcha * `authentik.stages.consent` - authentik Stages.Consent * `authentik.stages.deny` - authentik Stages.Deny * `authentik.stages.dummy` - authentik Stages.Dummy * `authentik.stages.email` - authentik Stages.Email * `authentik.stages.identification` - authentik Stages.Identification * `authentik.stages.invitation` - authentik Stages.User Invitation * `authentik.stages.password` - authentik Stages.Password * `authentik.stages.prompt` - authentik Stages.Prompt * `authentik.stages.user_delete` - authentik Stages.User Delete * `authentik.stages.user_login` - authentik Stages.User Login * `authentik.stages.user_logout` - authentik Stages.User Logout * `authentik.stages.user_write` - authentik Stages.User Write * `authentik.brands` - authentik Brands * `authentik.blueprints` - authentik Blueprints * `authentik.core` - authentik Core * `authentik.enterprise` - authentik Enterprise * `authentik.enterprise.audit` - authentik Enterprise.Audit * `authentik.enterprise.providers.rac` - authentik Enterprise.Providers.RAC * - * Values: tenants,admin,api,crypto,events,flows,outposts,policiesPeriodDummy,policiesPeriodEventMatcher,policiesPeriodExpiry,policiesPeriodExpression,policiesPeriodPassword,policiesPeriodReputation,policies,providersPeriodLdap,providersPeriodOauth2,providersPeriodProxy,providersPeriodRadius,providersPeriodSaml,providersPeriodScim,rbac,recovery,sourcesPeriodLdap,sourcesPeriodOauth,sourcesPeriodPlex,sourcesPeriodSaml,stagesPeriodAuthenticator,stagesPeriodAuthenticatorDuo,stagesPeriodAuthenticatorSms,stagesPeriodAuthenticatorStatic,stagesPeriodAuthenticatorTotp,stagesPeriodAuthenticatorValidate,stagesPeriodAuthenticatorWebauthn,stagesPeriodCaptcha,stagesPeriodConsent,stagesPeriodDeny,stagesPeriodDummy,stagesPeriodEmail,stagesPeriodIdentification,stagesPeriodInvitation,stagesPeriodPassword,stagesPeriodPrompt,stagesPeriodUserDelete,stagesPeriodUserLogin,stagesPeriodUserLogout,stagesPeriodUserWrite,brands,blueprints,core,enterprise,enterprisePeriodAudit,enterprisePeriodProvidersPeriodRac,unknownDefaultOpenApi + * Values: tenants,admin,api,crypto,events,flows,outposts,policiesPeriodDummy,policiesPeriodEventMatcher,policiesPeriodExpiry,policiesPeriodExpression,policiesPeriodPassword,policiesPeriodReputation,policies,providersPeriodLdap,providersPeriodOauth2,providersPeriodProxy,providersPeriodRadius,providersPeriodSaml,providersPeriodScim,rbac,recovery,sourcesPeriodLdap,sourcesPeriodOauth,sourcesPeriodPlex,sourcesPeriodSaml,stagesPeriodAuthenticator,stagesPeriodAuthenticatorDuo,stagesPeriodAuthenticatorMobile,stagesPeriodAuthenticatorSms,stagesPeriodAuthenticatorStatic,stagesPeriodAuthenticatorTotp,stagesPeriodAuthenticatorValidate,stagesPeriodAuthenticatorWebauthn,stagesPeriodCaptcha,stagesPeriodConsent,stagesPeriodDeny,stagesPeriodDummy,stagesPeriodEmail,stagesPeriodIdentification,stagesPeriodInvitation,stagesPeriodPassword,stagesPeriodPrompt,stagesPeriodUserDelete,stagesPeriodUserLogin,stagesPeriodUserLogout,stagesPeriodUserWrite,brands,blueprints,core,enterprise,enterprisePeriodAudit,enterprisePeriodProvidersPeriodRac,unknownDefaultOpenApi */ @JsonClass(generateAdapter = false) @@ -112,6 +112,9 @@ enum class AppEnum(val value: kotlin.String) { @Json(name = "authentik.stages.authenticator_duo") stagesPeriodAuthenticatorDuo("authentik.stages.authenticator_duo"), + @Json(name = "authentik.stages.authenticator_mobile") + stagesPeriodAuthenticatorMobile("authentik.stages.authenticator_mobile"), + @Json(name = "authentik.stages.authenticator_sms") stagesPeriodAuthenticatorSms("authentik.stages.authenticator_sms"), diff --git a/src/main/kotlin/io/goauthentik/api/models/AuthenticatorMobileChallenge.kt b/src/main/kotlin/io/goauthentik/api/models/AuthenticatorMobileChallenge.kt new file mode 100644 index 0000000..e2c42c8 --- /dev/null +++ b/src/main/kotlin/io/goauthentik/api/models/AuthenticatorMobileChallenge.kt @@ -0,0 +1,63 @@ +/** + * + * Please note: + * This class is auto generated by OpenAPI Generator (https://openapi-generator.tech). + * Do not edit this file manually. + * + */ + +@file:Suppress( + "ArrayInDataClass", + "EnumEntryName", + "RemoveRedundantQualifierName", + "UnusedImport" +) + +package io.goauthentik.api.models + +import io.goauthentik.api.models.AuthenticatorMobilePayloadChallenge +import io.goauthentik.api.models.ChallengeChoices +import io.goauthentik.api.models.ContextualFlowInfo +import io.goauthentik.api.models.ErrorDetail + +import com.squareup.moshi.Json +import com.squareup.moshi.JsonClass + +/** + * Mobile Challenge + * + * @param type + * @param pendingUser + * @param pendingUserAvatar + * @param payload + * @param flowInfo + * @param component + * @param responseErrors + */ + + +data class AuthenticatorMobileChallenge ( + + @Json(name = "type") + val type: ChallengeChoices, + + @Json(name = "pending_user") + val pendingUser: kotlin.String, + + @Json(name = "pending_user_avatar") + val pendingUserAvatar: kotlin.String, + + @Json(name = "payload") + val payload: AuthenticatorMobilePayloadChallenge, + + @Json(name = "flow_info") + val flowInfo: ContextualFlowInfo? = null, + + @Json(name = "component") + val component: kotlin.String? = "ak-stage-authenticator-mobile", + + @Json(name = "response_errors") + val responseErrors: kotlin.collections.Map>? = null + +) + diff --git a/src/main/kotlin/io/goauthentik/api/models/AuthenticatorMobileChallengeResponseRequest.kt b/src/main/kotlin/io/goauthentik/api/models/AuthenticatorMobileChallengeResponseRequest.kt new file mode 100644 index 0000000..a4e514e --- /dev/null +++ b/src/main/kotlin/io/goauthentik/api/models/AuthenticatorMobileChallengeResponseRequest.kt @@ -0,0 +1,35 @@ +/** + * + * Please note: + * This class is auto generated by OpenAPI Generator (https://openapi-generator.tech). + * Do not edit this file manually. + * + */ + +@file:Suppress( + "ArrayInDataClass", + "EnumEntryName", + "RemoveRedundantQualifierName", + "UnusedImport" +) + +package io.goauthentik.api.models + + +import com.squareup.moshi.Json +import com.squareup.moshi.JsonClass + +/** + * Pseudo class for mobile response + * + * @param component + */ + + +data class AuthenticatorMobileChallengeResponseRequest ( + + @Json(name = "component") + val component: kotlin.String? = "ak-stage-authenticator-mobile" + +) + diff --git a/src/main/kotlin/io/goauthentik/api/models/AuthenticatorMobilePayloadChallenge.kt b/src/main/kotlin/io/goauthentik/api/models/AuthenticatorMobilePayloadChallenge.kt new file mode 100644 index 0000000..a61f29d --- /dev/null +++ b/src/main/kotlin/io/goauthentik/api/models/AuthenticatorMobilePayloadChallenge.kt @@ -0,0 +1,46 @@ +/** + * + * Please note: + * This class is auto generated by OpenAPI Generator (https://openapi-generator.tech). + * Do not edit this file manually. + * + */ + +@file:Suppress( + "ArrayInDataClass", + "EnumEntryName", + "RemoveRedundantQualifierName", + "UnusedImport" +) + +package io.goauthentik.api.models + + +import com.squareup.moshi.Json +import com.squareup.moshi.JsonClass + +/** + * Payload within the QR code given to the mobile app, hence the short variable names + * + * @param u Server URL + * @param s Stage UUID + * @param t Initial Token + */ + + +data class AuthenticatorMobilePayloadChallenge ( + + /* Server URL */ + @Json(name = "u") + val u: kotlin.String? = null, + + /* Stage UUID */ + @Json(name = "s") + val s: kotlin.String? = null, + + /* Initial Token */ + @Json(name = "t") + val t: kotlin.String? = null + +) + diff --git a/src/main/kotlin/io/goauthentik/api/models/AuthenticatorMobileStage.kt b/src/main/kotlin/io/goauthentik/api/models/AuthenticatorMobileStage.kt new file mode 100644 index 0000000..e24e848 --- /dev/null +++ b/src/main/kotlin/io/goauthentik/api/models/AuthenticatorMobileStage.kt @@ -0,0 +1,82 @@ +/** + * + * Please note: + * This class is auto generated by OpenAPI Generator (https://openapi-generator.tech). + * Do not edit this file manually. + * + */ + +@file:Suppress( + "ArrayInDataClass", + "EnumEntryName", + "RemoveRedundantQualifierName", + "UnusedImport" +) + +package io.goauthentik.api.models + +import io.goauthentik.api.models.FlowSet +import io.goauthentik.api.models.ItemMatchingModeEnum + +import com.squareup.moshi.Json +import com.squareup.moshi.JsonClass + +/** + * AuthenticatorMobileStage Serializer + * + * @param pk + * @param name + * @param component Get object type so that we know how to edit the object + * @param verboseName Return object's verbose_name + * @param verboseNamePlural Return object's plural verbose_name + * @param metaModelName Return internal model name + * @param cgwEndpoint + * @param flowSet + * @param configureFlow Flow used by an authenticated user to configure this Stage. If empty, user will not be able to configure this stage. + * @param friendlyName + * @param itemMatchingMode + */ + + +data class AuthenticatorMobileStage ( + + @Json(name = "pk") + val pk: java.util.UUID, + + @Json(name = "name") + val name: kotlin.String, + + /* Get object type so that we know how to edit the object */ + @Json(name = "component") + val component: kotlin.String, + + /* Return object's verbose_name */ + @Json(name = "verbose_name") + val verboseName: kotlin.String, + + /* Return object's plural verbose_name */ + @Json(name = "verbose_name_plural") + val verboseNamePlural: kotlin.String, + + /* Return internal model name */ + @Json(name = "meta_model_name") + val metaModelName: kotlin.String, + + @Json(name = "cgw_endpoint") + val cgwEndpoint: kotlin.String, + + @Json(name = "flow_set") + val flowSet: kotlin.collections.List? = null, + + /* Flow used by an authenticated user to configure this Stage. If empty, user will not be able to configure this stage. */ + @Json(name = "configure_flow") + val configureFlow: java.util.UUID? = null, + + @Json(name = "friendly_name") + val friendlyName: kotlin.String? = null, + + @Json(name = "item_matching_mode") + val itemMatchingMode: ItemMatchingModeEnum? = null + +) + diff --git a/src/main/kotlin/io/goauthentik/api/models/AuthenticatorMobileStageRequest.kt b/src/main/kotlin/io/goauthentik/api/models/AuthenticatorMobileStageRequest.kt new file mode 100644 index 0000000..ef79bbc --- /dev/null +++ b/src/main/kotlin/io/goauthentik/api/models/AuthenticatorMobileStageRequest.kt @@ -0,0 +1,58 @@ +/** + * + * Please note: + * This class is auto generated by OpenAPI Generator (https://openapi-generator.tech). + * Do not edit this file manually. + * + */ + +@file:Suppress( + "ArrayInDataClass", + "EnumEntryName", + "RemoveRedundantQualifierName", + "UnusedImport" +) + +package io.goauthentik.api.models + +import io.goauthentik.api.models.FlowSetRequest +import io.goauthentik.api.models.ItemMatchingModeEnum + +import com.squareup.moshi.Json +import com.squareup.moshi.JsonClass + +/** + * AuthenticatorMobileStage Serializer + * + * @param name + * @param cgwEndpoint + * @param flowSet + * @param configureFlow Flow used by an authenticated user to configure this Stage. If empty, user will not be able to configure this stage. + * @param friendlyName + * @param itemMatchingMode + */ + + +data class AuthenticatorMobileStageRequest ( + + @Json(name = "name") + val name: kotlin.String, + + @Json(name = "cgw_endpoint") + val cgwEndpoint: kotlin.String, + + @Json(name = "flow_set") + val flowSet: kotlin.collections.List? = null, + + /* Flow used by an authenticated user to configure this Stage. If empty, user will not be able to configure this stage. */ + @Json(name = "configure_flow") + val configureFlow: java.util.UUID? = null, + + @Json(name = "friendly_name") + val friendlyName: kotlin.String? = null, + + @Json(name = "item_matching_mode") + val itemMatchingMode: ItemMatchingModeEnum? = null + +) + diff --git a/src/main/kotlin/io/goauthentik/api/models/AuthenticatorValidationChallengeResponseRequest.kt b/src/main/kotlin/io/goauthentik/api/models/AuthenticatorValidationChallengeResponseRequest.kt index e688b25..9a3a7b9 100644 --- a/src/main/kotlin/io/goauthentik/api/models/AuthenticatorValidationChallengeResponseRequest.kt +++ b/src/main/kotlin/io/goauthentik/api/models/AuthenticatorValidationChallengeResponseRequest.kt @@ -29,6 +29,7 @@ import com.squareup.moshi.JsonClass * @param code * @param webauthn * @param duo + * @param mobile */ @@ -50,7 +51,10 @@ data class AuthenticatorValidationChallengeResponseRequest ( val webauthn: kotlin.collections.Map? = null, @Json(name = "duo") - val duo: kotlin.Int? = null + val duo: kotlin.Int? = null, + + @Json(name = "mobile") + val mobile: kotlin.String? = null ) diff --git a/src/main/kotlin/io/goauthentik/api/models/ChallengeTypes.kt b/src/main/kotlin/io/goauthentik/api/models/ChallengeTypes.kt index 9b613fe..0606543 100644 --- a/src/main/kotlin/io/goauthentik/api/models/ChallengeTypes.kt +++ b/src/main/kotlin/io/goauthentik/api/models/ChallengeTypes.kt @@ -18,6 +18,8 @@ package io.goauthentik.api.models import io.goauthentik.api.models.AccessDeniedChallenge import io.goauthentik.api.models.AppleLoginChallenge import io.goauthentik.api.models.AuthenticatorDuoChallenge +import io.goauthentik.api.models.AuthenticatorMobileChallenge +import io.goauthentik.api.models.AuthenticatorMobilePayloadChallenge import io.goauthentik.api.models.AuthenticatorSMSChallenge import io.goauthentik.api.models.AuthenticatorStaticChallenge import io.goauthentik.api.models.AuthenticatorTOTPChallenge @@ -63,6 +65,7 @@ import com.squareup.moshi.JsonClass * @param activationBarcode * @param activationCode * @param stageUuid + * @param payload * @param codes * @param configUrl * @param deviceChallenges @@ -123,6 +126,8 @@ interface ChallengeTypes { val activationCode: kotlin.String @Json(name = "stage_uuid") val stageUuid: kotlin.String + @Json(name = "payload") + val payload: AuthenticatorMobilePayloadChallenge @Json(name = "codes") val codes: kotlin.collections.List @Json(name = "config_url") diff --git a/src/main/kotlin/io/goauthentik/api/models/Device.kt b/src/main/kotlin/io/goauthentik/api/models/Device.kt index e69ec66..17c98aa 100644 --- a/src/main/kotlin/io/goauthentik/api/models/Device.kt +++ b/src/main/kotlin/io/goauthentik/api/models/Device.kt @@ -47,7 +47,7 @@ data class Device ( val metaModelName: kotlin.String, @Json(name = "pk") - val pk: kotlin.Int, + val pk: kotlin.String, @Json(name = "name") val name: kotlin.String, diff --git a/src/main/kotlin/io/goauthentik/api/models/DeviceClassesEnum.kt b/src/main/kotlin/io/goauthentik/api/models/DeviceClassesEnum.kt index 0dc2a5a..ae6ecb1 100644 --- a/src/main/kotlin/io/goauthentik/api/models/DeviceClassesEnum.kt +++ b/src/main/kotlin/io/goauthentik/api/models/DeviceClassesEnum.kt @@ -20,9 +20,9 @@ import com.squareup.moshi.Json import com.squareup.moshi.JsonClass /** - * * `static` - Static * `totp` - TOTP * `webauthn` - WebAuthn * `duo` - Duo * `sms` - SMS + * * `static` - Static * `totp` - TOTP * `webauthn` - WebAuthn * `duo` - Duo * `sms` - SMS * `mobile` - authentik Mobile * - * Values: static,totp,webauthn,duo,sms,unknownDefaultOpenApi + * Values: static,totp,webauthn,duo,sms,mobile,unknownDefaultOpenApi */ @JsonClass(generateAdapter = false) @@ -43,6 +43,9 @@ enum class DeviceClassesEnum(val value: kotlin.String) { @Json(name = "sms") sms("sms"), + @Json(name = "mobile") + mobile("mobile"), + @Json(name = "unknown_default_open_api") unknownDefaultOpenApi("unknown_default_open_api"); diff --git a/src/main/kotlin/io/goauthentik/api/models/DuoDevice.kt b/src/main/kotlin/io/goauthentik/api/models/DuoDevice.kt index 0395256..ff26b6c 100644 --- a/src/main/kotlin/io/goauthentik/api/models/DuoDevice.kt +++ b/src/main/kotlin/io/goauthentik/api/models/DuoDevice.kt @@ -22,19 +22,42 @@ import com.squareup.moshi.JsonClass /** * Serializer for Duo authenticator devices * + * @param verboseName Return object's verbose_name + * @param verboseNamePlural Return object's plural verbose_name + * @param metaModelName Return internal model name * @param pk - * @param name The human-readable name of this device. + * @param name + * @param type Get type of device + * @param confirmed */ data class DuoDevice ( + /* Return object's verbose_name */ + @Json(name = "verbose_name") + val verboseName: kotlin.String, + + /* Return object's plural verbose_name */ + @Json(name = "verbose_name_plural") + val verboseNamePlural: kotlin.String, + + /* Return internal model name */ + @Json(name = "meta_model_name") + val metaModelName: kotlin.String, + @Json(name = "pk") - val pk: kotlin.Int, + val pk: kotlin.String, - /* The human-readable name of this device. */ @Json(name = "name") - val name: kotlin.String + val name: kotlin.String, + + /* Get type of device */ + @Json(name = "type") + val type: kotlin.String, + + @Json(name = "confirmed") + val confirmed: kotlin.Boolean ) diff --git a/src/main/kotlin/io/goauthentik/api/models/DuoDeviceRequest.kt b/src/main/kotlin/io/goauthentik/api/models/DuoDeviceRequest.kt index 88d9290..8d1ce76 100644 --- a/src/main/kotlin/io/goauthentik/api/models/DuoDeviceRequest.kt +++ b/src/main/kotlin/io/goauthentik/api/models/DuoDeviceRequest.kt @@ -22,13 +22,16 @@ import com.squareup.moshi.JsonClass /** * Serializer for Duo authenticator devices * - * @param name The human-readable name of this device. + * @param pk + * @param name */ data class DuoDeviceRequest ( - /* The human-readable name of this device. */ + @Json(name = "pk") + val pk: kotlin.String, + @Json(name = "name") val name: kotlin.String diff --git a/src/main/kotlin/io/goauthentik/api/models/FlowChallengeResponseRequest.kt b/src/main/kotlin/io/goauthentik/api/models/FlowChallengeResponseRequest.kt index 41c7522..8433841 100644 --- a/src/main/kotlin/io/goauthentik/api/models/FlowChallengeResponseRequest.kt +++ b/src/main/kotlin/io/goauthentik/api/models/FlowChallengeResponseRequest.kt @@ -17,6 +17,7 @@ package io.goauthentik.api.models import io.goauthentik.api.models.AppleChallengeResponseRequest import io.goauthentik.api.models.AuthenticatorDuoChallengeResponseRequest +import io.goauthentik.api.models.AuthenticatorMobileChallengeResponseRequest import io.goauthentik.api.models.AuthenticatorSMSChallengeResponseRequest import io.goauthentik.api.models.AuthenticatorStaticChallengeResponseRequest import io.goauthentik.api.models.AuthenticatorTOTPChallengeResponseRequest @@ -54,6 +55,7 @@ import com.squareup.moshi.JsonClass * @param selectedStage * @param webauthn * @param duo + * @param mobile */ @@ -83,5 +85,7 @@ interface FlowChallengeResponseRequest { val webauthn: kotlin.collections.Map? @Json(name = "duo") val duo: kotlin.Int? + @Json(name = "mobile") + val mobile: kotlin.String? } diff --git a/src/main/kotlin/io/goauthentik/api/models/ItemMatchingModeEnum.kt b/src/main/kotlin/io/goauthentik/api/models/ItemMatchingModeEnum.kt new file mode 100644 index 0000000..61d5011 --- /dev/null +++ b/src/main/kotlin/io/goauthentik/api/models/ItemMatchingModeEnum.kt @@ -0,0 +1,69 @@ +/** + * + * Please note: + * This class is auto generated by OpenAPI Generator (https://openapi-generator.tech). + * Do not edit this file manually. + * + */ + +@file:Suppress( + "ArrayInDataClass", + "EnumEntryName", + "RemoveRedundantQualifierName", + "UnusedImport" +) + +package io.goauthentik.api.models + + +import com.squareup.moshi.Json +import com.squareup.moshi.JsonClass + +/** + * * `accept_deny` - Accept Deny * `number_matching_2` - Number Matching 2 * `number_matching_3` - Number Matching 3 + * + * Values: acceptDeny,numberMatching2,numberMatching3,unknownDefaultOpenApi + */ + +@JsonClass(generateAdapter = false) +enum class ItemMatchingModeEnum(val value: kotlin.String) { + + @Json(name = "accept_deny") + acceptDeny("accept_deny"), + + @Json(name = "number_matching_2") + numberMatching2("number_matching_2"), + + @Json(name = "number_matching_3") + numberMatching3("number_matching_3"), + + @Json(name = "unknown_default_open_api") + unknownDefaultOpenApi("unknown_default_open_api"); + + /** + * Override [toString()] to avoid using the enum variable name as the value, and instead use + * the actual value defined in the API spec file. + * + * This solves a problem when the variable name and its value are different, and ensures that + * the client sends the correct enum values to the server always. + */ + override fun toString(): kotlin.String = value + + companion object { + /** + * Converts the provided [data] to a [String] on success, null otherwise. + */ + fun encode(data: kotlin.Any?): kotlin.String? = if (data is ItemMatchingModeEnum) "$data" else null + + /** + * Returns a valid [ItemMatchingModeEnum] for [data], null otherwise. + */ + fun decode(data: kotlin.Any?): ItemMatchingModeEnum? = data?.let { + val normalizedData = "$it".lowercase() + values().firstOrNull { value -> + it == value || normalizedData == "$value".lowercase() + } + } + } +} + diff --git a/src/main/kotlin/io/goauthentik/api/models/LDAPSyncStatus.kt b/src/main/kotlin/io/goauthentik/api/models/LDAPSyncStatus.kt index 54b2835..3f53a48 100644 --- a/src/main/kotlin/io/goauthentik/api/models/LDAPSyncStatus.kt +++ b/src/main/kotlin/io/goauthentik/api/models/LDAPSyncStatus.kt @@ -15,7 +15,7 @@ package io.goauthentik.api.models -import io.goauthentik.api.models.Task +import io.goauthentik.api.models.SystemTask import com.squareup.moshi.Json import com.squareup.moshi.JsonClass @@ -34,7 +34,7 @@ data class LDAPSyncStatus ( val isRunning: kotlin.Boolean, @Json(name = "tasks") - val tasks: kotlin.collections.List + val tasks: kotlin.collections.List ) diff --git a/src/main/kotlin/io/goauthentik/api/models/MobileDevice.kt b/src/main/kotlin/io/goauthentik/api/models/MobileDevice.kt new file mode 100644 index 0000000..11aef8a --- /dev/null +++ b/src/main/kotlin/io/goauthentik/api/models/MobileDevice.kt @@ -0,0 +1,72 @@ +/** + * + * Please note: + * This class is auto generated by OpenAPI Generator (https://openapi-generator.tech). + * Do not edit this file manually. + * + */ + +@file:Suppress( + "ArrayInDataClass", + "EnumEntryName", + "RemoveRedundantQualifierName", + "UnusedImport" +) + +package io.goauthentik.api.models + +import io.goauthentik.api.models.MobileDeviceInfo + +import com.squareup.moshi.Json +import com.squareup.moshi.JsonClass + +/** + * Serializer for Mobile authenticator devices + * + * @param verboseName Return object's verbose_name + * @param verboseNamePlural Return object's plural verbose_name + * @param metaModelName Return internal model name + * @param pk + * @param name + * @param type Get type of device + * @param confirmed + * @param state + * @param lastCheckin + */ + + +data class MobileDevice ( + + /* Return object's verbose_name */ + @Json(name = "verbose_name") + val verboseName: kotlin.String, + + /* Return object's plural verbose_name */ + @Json(name = "verbose_name_plural") + val verboseNamePlural: kotlin.String, + + /* Return internal model name */ + @Json(name = "meta_model_name") + val metaModelName: kotlin.String, + + @Json(name = "pk") + val pk: kotlin.String, + + @Json(name = "name") + val name: kotlin.String, + + /* Get type of device */ + @Json(name = "type") + val type: kotlin.String, + + @Json(name = "confirmed") + val confirmed: kotlin.Boolean, + + @Json(name = "state") + val state: MobileDeviceInfo, + + @Json(name = "last_checkin") + val lastCheckin: java.time.OffsetDateTime + +) + diff --git a/src/main/kotlin/io/goauthentik/api/models/MobileDeviceCheckInRequest.kt b/src/main/kotlin/io/goauthentik/api/models/MobileDeviceCheckInRequest.kt new file mode 100644 index 0000000..14a3b6a --- /dev/null +++ b/src/main/kotlin/io/goauthentik/api/models/MobileDeviceCheckInRequest.kt @@ -0,0 +1,40 @@ +/** + * + * Please note: + * This class is auto generated by OpenAPI Generator (https://openapi-generator.tech). + * Do not edit this file manually. + * + */ + +@file:Suppress( + "ArrayInDataClass", + "EnumEntryName", + "RemoveRedundantQualifierName", + "UnusedImport" +) + +package io.goauthentik.api.models + +import io.goauthentik.api.models.MobileDeviceInfoRequest + +import com.squareup.moshi.Json +import com.squareup.moshi.JsonClass + +/** + * Check info into authentik + * + * @param info + * @param firebaseKey + */ + + +data class MobileDeviceCheckInRequest ( + + @Json(name = "info") + val info: MobileDeviceInfoRequest, + + @Json(name = "firebase_key") + val firebaseKey: kotlin.String? = null + +) + diff --git a/src/main/kotlin/io/goauthentik/api/models/MobileDeviceEnrollmentCallback.kt b/src/main/kotlin/io/goauthentik/api/models/MobileDeviceEnrollmentCallback.kt new file mode 100644 index 0000000..39b8ced --- /dev/null +++ b/src/main/kotlin/io/goauthentik/api/models/MobileDeviceEnrollmentCallback.kt @@ -0,0 +1,35 @@ +/** + * + * Please note: + * This class is auto generated by OpenAPI Generator (https://openapi-generator.tech). + * Do not edit this file manually. + * + */ + +@file:Suppress( + "ArrayInDataClass", + "EnumEntryName", + "RemoveRedundantQualifierName", + "UnusedImport" +) + +package io.goauthentik.api.models + + +import com.squareup.moshi.Json +import com.squareup.moshi.JsonClass + +/** + * + * + * @param token + */ + + +data class MobileDeviceEnrollmentCallback ( + + @Json(name = "token") + val token: kotlin.String + +) + diff --git a/src/main/kotlin/io/goauthentik/api/models/MobileDeviceEnrollmentRequest.kt b/src/main/kotlin/io/goauthentik/api/models/MobileDeviceEnrollmentRequest.kt new file mode 100644 index 0000000..567ee29 --- /dev/null +++ b/src/main/kotlin/io/goauthentik/api/models/MobileDeviceEnrollmentRequest.kt @@ -0,0 +1,44 @@ +/** + * + * Please note: + * This class is auto generated by OpenAPI Generator (https://openapi-generator.tech). + * Do not edit this file manually. + * + */ + +@file:Suppress( + "ArrayInDataClass", + "EnumEntryName", + "RemoveRedundantQualifierName", + "UnusedImport" +) + +package io.goauthentik.api.models + +import io.goauthentik.api.models.MobileDeviceInfoRequest + +import com.squareup.moshi.Json +import com.squareup.moshi.JsonClass + +/** + * Enrollment request, send the device's unique identifier + * + * @param deviceUid + * @param info + * @param firebaseKey + */ + + +data class MobileDeviceEnrollmentRequest ( + + @Json(name = "device_uid") + val deviceUid: kotlin.String, + + @Json(name = "info") + val info: MobileDeviceInfoRequest, + + @Json(name = "firebase_key") + val firebaseKey: kotlin.String? = null + +) + diff --git a/src/main/kotlin/io/goauthentik/api/models/MobileDeviceEnrollmentStatus.kt b/src/main/kotlin/io/goauthentik/api/models/MobileDeviceEnrollmentStatus.kt new file mode 100644 index 0000000..aabcf62 --- /dev/null +++ b/src/main/kotlin/io/goauthentik/api/models/MobileDeviceEnrollmentStatus.kt @@ -0,0 +1,36 @@ +/** + * + * Please note: + * This class is auto generated by OpenAPI Generator (https://openapi-generator.tech). + * Do not edit this file manually. + * + */ + +@file:Suppress( + "ArrayInDataClass", + "EnumEntryName", + "RemoveRedundantQualifierName", + "UnusedImport" +) + +package io.goauthentik.api.models + +import io.goauthentik.api.models.MobileDeviceEnrollmentStatusStatusEnum + +import com.squareup.moshi.Json +import com.squareup.moshi.JsonClass + +/** + * + * + * @param status + */ + + +data class MobileDeviceEnrollmentStatus ( + + @Json(name = "status") + val status: MobileDeviceEnrollmentStatusStatusEnum + +) + diff --git a/src/main/kotlin/io/goauthentik/api/models/MobileDeviceEnrollmentStatusStatusEnum.kt b/src/main/kotlin/io/goauthentik/api/models/MobileDeviceEnrollmentStatusStatusEnum.kt new file mode 100644 index 0000000..425f151 --- /dev/null +++ b/src/main/kotlin/io/goauthentik/api/models/MobileDeviceEnrollmentStatusStatusEnum.kt @@ -0,0 +1,66 @@ +/** + * + * Please note: + * This class is auto generated by OpenAPI Generator (https://openapi-generator.tech). + * Do not edit this file manually. + * + */ + +@file:Suppress( + "ArrayInDataClass", + "EnumEntryName", + "RemoveRedundantQualifierName", + "UnusedImport" +) + +package io.goauthentik.api.models + + +import com.squareup.moshi.Json +import com.squareup.moshi.JsonClass + +/** + * * `success` - Success * `waiting` - Waiting + * + * Values: success,waiting,unknownDefaultOpenApi + */ + +@JsonClass(generateAdapter = false) +enum class MobileDeviceEnrollmentStatusStatusEnum(val value: kotlin.String) { + + @Json(name = "success") + success("success"), + + @Json(name = "waiting") + waiting("waiting"), + + @Json(name = "unknown_default_open_api") + unknownDefaultOpenApi("unknown_default_open_api"); + + /** + * Override [toString()] to avoid using the enum variable name as the value, and instead use + * the actual value defined in the API spec file. + * + * This solves a problem when the variable name and its value are different, and ensures that + * the client sends the correct enum values to the server always. + */ + override fun toString(): kotlin.String = value + + companion object { + /** + * Converts the provided [data] to a [String] on success, null otherwise. + */ + fun encode(data: kotlin.Any?): kotlin.String? = if (data is MobileDeviceEnrollmentStatusStatusEnum) "$data" else null + + /** + * Returns a valid [MobileDeviceEnrollmentStatusStatusEnum] for [data], null otherwise. + */ + fun decode(data: kotlin.Any?): MobileDeviceEnrollmentStatusStatusEnum? = data?.let { + val normalizedData = "$it".lowercase() + values().firstOrNull { value -> + it == value || normalizedData == "$value".lowercase() + } + } + } +} + diff --git a/src/main/kotlin/io/goauthentik/api/models/MobileDeviceInfo.kt b/src/main/kotlin/io/goauthentik/api/models/MobileDeviceInfo.kt new file mode 100644 index 0000000..b699a1a --- /dev/null +++ b/src/main/kotlin/io/goauthentik/api/models/MobileDeviceInfo.kt @@ -0,0 +1,56 @@ +/** + * + * Please note: + * This class is auto generated by OpenAPI Generator (https://openapi-generator.tech). + * Do not edit this file manually. + * + */ + +@file:Suppress( + "ArrayInDataClass", + "EnumEntryName", + "RemoveRedundantQualifierName", + "UnusedImport" +) + +package io.goauthentik.api.models + +import io.goauthentik.api.models.PlatformEnum + +import com.squareup.moshi.Json +import com.squareup.moshi.JsonClass + +/** + * Info about a mobile device + * + * @param platform + * @param osVersion + * @param model + * @param hostname + * @param appVersion + * @param others + */ + + +data class MobileDeviceInfo ( + + @Json(name = "platform") + val platform: PlatformEnum, + + @Json(name = "os_version") + val osVersion: kotlin.String, + + @Json(name = "model") + val model: kotlin.String, + + @Json(name = "hostname") + val hostname: kotlin.String, + + @Json(name = "app_version") + val appVersion: kotlin.String, + + @Json(name = "others") + val others: kotlin.Any? + +) + diff --git a/src/main/kotlin/io/goauthentik/api/models/MobileDeviceInfoRequest.kt b/src/main/kotlin/io/goauthentik/api/models/MobileDeviceInfoRequest.kt new file mode 100644 index 0000000..fca720f --- /dev/null +++ b/src/main/kotlin/io/goauthentik/api/models/MobileDeviceInfoRequest.kt @@ -0,0 +1,56 @@ +/** + * + * Please note: + * This class is auto generated by OpenAPI Generator (https://openapi-generator.tech). + * Do not edit this file manually. + * + */ + +@file:Suppress( + "ArrayInDataClass", + "EnumEntryName", + "RemoveRedundantQualifierName", + "UnusedImport" +) + +package io.goauthentik.api.models + +import io.goauthentik.api.models.PlatformEnum + +import com.squareup.moshi.Json +import com.squareup.moshi.JsonClass + +/** + * Info about a mobile device + * + * @param platform + * @param osVersion + * @param model + * @param hostname + * @param appVersion + * @param others + */ + + +data class MobileDeviceInfoRequest ( + + @Json(name = "platform") + val platform: PlatformEnum, + + @Json(name = "os_version") + val osVersion: kotlin.String, + + @Json(name = "model") + val model: kotlin.String, + + @Json(name = "hostname") + val hostname: kotlin.String, + + @Json(name = "app_version") + val appVersion: kotlin.String, + + @Json(name = "others") + val others: kotlin.Any? + +) + diff --git a/src/main/kotlin/io/goauthentik/api/models/MobileDeviceRequest.kt b/src/main/kotlin/io/goauthentik/api/models/MobileDeviceRequest.kt new file mode 100644 index 0000000..8a6fe37 --- /dev/null +++ b/src/main/kotlin/io/goauthentik/api/models/MobileDeviceRequest.kt @@ -0,0 +1,39 @@ +/** + * + * Please note: + * This class is auto generated by OpenAPI Generator (https://openapi-generator.tech). + * Do not edit this file manually. + * + */ + +@file:Suppress( + "ArrayInDataClass", + "EnumEntryName", + "RemoveRedundantQualifierName", + "UnusedImport" +) + +package io.goauthentik.api.models + + +import com.squareup.moshi.Json +import com.squareup.moshi.JsonClass + +/** + * Serializer for Mobile authenticator devices + * + * @param pk + * @param name + */ + + +data class MobileDeviceRequest ( + + @Json(name = "pk") + val pk: kotlin.String, + + @Json(name = "name") + val name: kotlin.String + +) + diff --git a/src/main/kotlin/io/goauthentik/api/models/MobileDeviceResponseRequest.kt b/src/main/kotlin/io/goauthentik/api/models/MobileDeviceResponseRequest.kt new file mode 100644 index 0000000..8bf0cd2 --- /dev/null +++ b/src/main/kotlin/io/goauthentik/api/models/MobileDeviceResponseRequest.kt @@ -0,0 +1,39 @@ +/** + * + * Please note: + * This class is auto generated by OpenAPI Generator (https://openapi-generator.tech). + * Do not edit this file manually. + * + */ + +@file:Suppress( + "ArrayInDataClass", + "EnumEntryName", + "RemoveRedundantQualifierName", + "UnusedImport" +) + +package io.goauthentik.api.models + + +import com.squareup.moshi.Json +import com.squareup.moshi.JsonClass + +/** + * Response from push sent to phone + * + * @param txId + * @param selectedItem + */ + + +data class MobileDeviceResponseRequest ( + + @Json(name = "tx_id") + val txId: java.util.UUID, + + @Json(name = "selected_item") + val selectedItem: kotlin.String + +) + diff --git a/src/main/kotlin/io/goauthentik/api/models/ModelEnum.kt b/src/main/kotlin/io/goauthentik/api/models/ModelEnum.kt index a9d2bff..1676570 100644 --- a/src/main/kotlin/io/goauthentik/api/models/ModelEnum.kt +++ b/src/main/kotlin/io/goauthentik/api/models/ModelEnum.kt @@ -20,9 +20,9 @@ import com.squareup.moshi.Json import com.squareup.moshi.JsonClass /** - * * `authentik_tenants.domain` - Domain * `authentik_crypto.certificatekeypair` - Certificate-Key Pair * `authentik_events.event` - Event * `authentik_events.notificationtransport` - Notification Transport * `authentik_events.notification` - Notification * `authentik_events.notificationrule` - Notification Rule * `authentik_events.notificationwebhookmapping` - Webhook Mapping * `authentik_flows.flow` - Flow * `authentik_flows.flowstagebinding` - Flow Stage Binding * `authentik_outposts.dockerserviceconnection` - Docker Service-Connection * `authentik_outposts.kubernetesserviceconnection` - Kubernetes Service-Connection * `authentik_outposts.outpost` - Outpost * `authentik_policies_dummy.dummypolicy` - Dummy Policy * `authentik_policies_event_matcher.eventmatcherpolicy` - Event Matcher Policy * `authentik_policies_expiry.passwordexpirypolicy` - Password Expiry Policy * `authentik_policies_expression.expressionpolicy` - Expression Policy * `authentik_policies_password.passwordpolicy` - Password Policy * `authentik_policies_reputation.reputationpolicy` - Reputation Policy * `authentik_policies_reputation.reputation` - Reputation Score * `authentik_policies.policybinding` - Policy Binding * `authentik_providers_ldap.ldapprovider` - LDAP Provider * `authentik_providers_oauth2.scopemapping` - Scope Mapping * `authentik_providers_oauth2.oauth2provider` - OAuth2/OpenID Provider * `authentik_providers_oauth2.authorizationcode` - Authorization Code * `authentik_providers_oauth2.accesstoken` - OAuth2 Access Token * `authentik_providers_oauth2.refreshtoken` - OAuth2 Refresh Token * `authentik_providers_proxy.proxyprovider` - Proxy Provider * `authentik_providers_radius.radiusprovider` - Radius Provider * `authentik_providers_saml.samlprovider` - SAML Provider * `authentik_providers_saml.samlpropertymapping` - SAML Property Mapping * `authentik_providers_scim.scimprovider` - SCIM Provider * `authentik_providers_scim.scimmapping` - SCIM Mapping * `authentik_rbac.role` - Role * `authentik_sources_ldap.ldapsource` - LDAP Source * `authentik_sources_ldap.ldappropertymapping` - LDAP Property Mapping * `authentik_sources_oauth.oauthsource` - OAuth Source * `authentik_sources_oauth.useroauthsourceconnection` - User OAuth Source Connection * `authentik_sources_plex.plexsource` - Plex Source * `authentik_sources_plex.plexsourceconnection` - User Plex Source Connection * `authentik_sources_saml.samlsource` - SAML Source * `authentik_sources_saml.usersamlsourceconnection` - User SAML Source Connection * `authentik_stages_authenticator_duo.authenticatorduostage` - Duo Authenticator Setup Stage * `authentik_stages_authenticator_duo.duodevice` - Duo Device * `authentik_stages_authenticator_sms.authenticatorsmsstage` - SMS Authenticator Setup Stage * `authentik_stages_authenticator_sms.smsdevice` - SMS Device * `authentik_stages_authenticator_static.authenticatorstaticstage` - Static Authenticator Stage * `authentik_stages_authenticator_static.staticdevice` - Static Device * `authentik_stages_authenticator_totp.authenticatortotpstage` - TOTP Authenticator Setup Stage * `authentik_stages_authenticator_totp.totpdevice` - TOTP Device * `authentik_stages_authenticator_validate.authenticatorvalidatestage` - Authenticator Validation Stage * `authentik_stages_authenticator_webauthn.authenticatewebauthnstage` - WebAuthn Authenticator Setup Stage * `authentik_stages_authenticator_webauthn.webauthndevice` - WebAuthn Device * `authentik_stages_captcha.captchastage` - Captcha Stage * `authentik_stages_consent.consentstage` - Consent Stage * `authentik_stages_consent.userconsent` - User Consent * `authentik_stages_deny.denystage` - Deny Stage * `authentik_stages_dummy.dummystage` - Dummy Stage * `authentik_stages_email.emailstage` - Email Stage * `authentik_stages_identification.identificationstage` - Identification Stage * `authentik_stages_invitation.invitationstage` - Invitation Stage * `authentik_stages_invitation.invitation` - Invitation * `authentik_stages_password.passwordstage` - Password Stage * `authentik_stages_prompt.prompt` - Prompt * `authentik_stages_prompt.promptstage` - Prompt Stage * `authentik_stages_user_delete.userdeletestage` - User Delete Stage * `authentik_stages_user_login.userloginstage` - User Login Stage * `authentik_stages_user_logout.userlogoutstage` - User Logout Stage * `authentik_stages_user_write.userwritestage` - User Write Stage * `authentik_brands.brand` - Brand * `authentik_blueprints.blueprintinstance` - Blueprint Instance * `authentik_core.group` - Group * `authentik_core.user` - User * `authentik_core.application` - Application * `authentik_core.token` - Token * `authentik_enterprise.license` - License * `authentik_providers_rac.racprovider` - RAC Provider * `authentik_providers_rac.endpoint` - RAC Endpoint * `authentik_providers_rac.racpropertymapping` - RAC Property Mapping + * * `authentik_tenants.domain` - Domain * `authentik_crypto.certificatekeypair` - Certificate-Key Pair * `authentik_events.event` - Event * `authentik_events.notificationtransport` - Notification Transport * `authentik_events.notification` - Notification * `authentik_events.notificationrule` - Notification Rule * `authentik_events.notificationwebhookmapping` - Webhook Mapping * `authentik_flows.flow` - Flow * `authentik_flows.flowstagebinding` - Flow Stage Binding * `authentik_outposts.dockerserviceconnection` - Docker Service-Connection * `authentik_outposts.kubernetesserviceconnection` - Kubernetes Service-Connection * `authentik_outposts.outpost` - Outpost * `authentik_policies_dummy.dummypolicy` - Dummy Policy * `authentik_policies_event_matcher.eventmatcherpolicy` - Event Matcher Policy * `authentik_policies_expiry.passwordexpirypolicy` - Password Expiry Policy * `authentik_policies_expression.expressionpolicy` - Expression Policy * `authentik_policies_password.passwordpolicy` - Password Policy * `authentik_policies_reputation.reputationpolicy` - Reputation Policy * `authentik_policies.policybinding` - Policy Binding * `authentik_providers_ldap.ldapprovider` - LDAP Provider * `authentik_providers_oauth2.scopemapping` - Scope Mapping * `authentik_providers_oauth2.oauth2provider` - OAuth2/OpenID Provider * `authentik_providers_proxy.proxyprovider` - Proxy Provider * `authentik_providers_radius.radiusprovider` - Radius Provider * `authentik_providers_saml.samlprovider` - SAML Provider * `authentik_providers_saml.samlpropertymapping` - SAML Property Mapping * `authentik_providers_scim.scimprovider` - SCIM Provider * `authentik_providers_scim.scimmapping` - SCIM Mapping * `authentik_rbac.role` - Role * `authentik_sources_ldap.ldapsource` - LDAP Source * `authentik_sources_ldap.ldappropertymapping` - LDAP Property Mapping * `authentik_sources_oauth.oauthsource` - OAuth Source * `authentik_sources_oauth.useroauthsourceconnection` - User OAuth Source Connection * `authentik_sources_plex.plexsource` - Plex Source * `authentik_sources_plex.plexsourceconnection` - User Plex Source Connection * `authentik_sources_saml.samlsource` - SAML Source * `authentik_sources_saml.usersamlsourceconnection` - User SAML Source Connection * `authentik_stages_authenticator_duo.authenticatorduostage` - Duo Authenticator Setup Stage * `authentik_stages_authenticator_duo.duodevice` - Duo Device * `authentik_stages_authenticator_mobile.authenticatormobilestage` - Mobile Authenticator Setup Stage * `authentik_stages_authenticator_mobile.mobiledevice` - Mobile Device * `authentik_stages_authenticator_sms.authenticatorsmsstage` - SMS Authenticator Setup Stage * `authentik_stages_authenticator_sms.smsdevice` - SMS Device * `authentik_stages_authenticator_static.authenticatorstaticstage` - Static Authenticator Setup Stage * `authentik_stages_authenticator_static.staticdevice` - Static Device * `authentik_stages_authenticator_totp.authenticatortotpstage` - TOTP Authenticator Setup Stage * `authentik_stages_authenticator_totp.totpdevice` - TOTP Device * `authentik_stages_authenticator_validate.authenticatorvalidatestage` - Authenticator Validation Stage * `authentik_stages_authenticator_webauthn.authenticatewebauthnstage` - WebAuthn Authenticator Setup Stage * `authentik_stages_authenticator_webauthn.webauthndevice` - WebAuthn Device * `authentik_stages_captcha.captchastage` - Captcha Stage * `authentik_stages_consent.consentstage` - Consent Stage * `authentik_stages_consent.userconsent` - User Consent * `authentik_stages_deny.denystage` - Deny Stage * `authentik_stages_dummy.dummystage` - Dummy Stage * `authentik_stages_email.emailstage` - Email Stage * `authentik_stages_identification.identificationstage` - Identification Stage * `authentik_stages_invitation.invitationstage` - Invitation Stage * `authentik_stages_invitation.invitation` - Invitation * `authentik_stages_password.passwordstage` - Password Stage * `authentik_stages_prompt.prompt` - Prompt * `authentik_stages_prompt.promptstage` - Prompt Stage * `authentik_stages_user_delete.userdeletestage` - User Delete Stage * `authentik_stages_user_login.userloginstage` - User Login Stage * `authentik_stages_user_logout.userlogoutstage` - User Logout Stage * `authentik_stages_user_write.userwritestage` - User Write Stage * `authentik_brands.brand` - Brand * `authentik_blueprints.blueprintinstance` - Blueprint Instance * `authentik_core.group` - Group * `authentik_core.user` - User * `authentik_core.application` - Application * `authentik_core.token` - Token * `authentik_enterprise.license` - License * `authentik_providers_rac.racprovider` - RAC Provider * `authentik_providers_rac.endpoint` - RAC Endpoint * `authentik_providers_rac.racpropertymapping` - RAC Property Mapping * - * Values: tenantsPeriodDomain,cryptoPeriodCertificatekeypair,eventsPeriodEvent,eventsPeriodNotificationtransport,eventsPeriodNotification,eventsPeriodNotificationrule,eventsPeriodNotificationwebhookmapping,flowsPeriodFlow,flowsPeriodFlowstagebinding,outpostsPeriodDockerserviceconnection,outpostsPeriodKubernetesserviceconnection,outpostsPeriodOutpost,policiesDummyPeriodDummypolicy,policiesEventMatcherPeriodEventmatcherpolicy,policiesExpiryPeriodPasswordexpirypolicy,policiesExpressionPeriodExpressionpolicy,policiesPasswordPeriodPasswordpolicy,policiesReputationPeriodReputationpolicy,policiesReputationPeriodReputation,policiesPeriodPolicybinding,providersLdapPeriodLdapprovider,providersOauth2PeriodScopemapping,providersOauth2PeriodOauth2provider,providersOauth2PeriodAuthorizationcode,providersOauth2PeriodAccesstoken,providersOauth2PeriodRefreshtoken,providersProxyPeriodProxyprovider,providersRadiusPeriodRadiusprovider,providersSamlPeriodSamlprovider,providersSamlPeriodSamlpropertymapping,providersScimPeriodScimprovider,providersScimPeriodScimmapping,rbacPeriodRole,sourcesLdapPeriodLdapsource,sourcesLdapPeriodLdappropertymapping,sourcesOauthPeriodOauthsource,sourcesOauthPeriodUseroauthsourceconnection,sourcesPlexPeriodPlexsource,sourcesPlexPeriodPlexsourceconnection,sourcesSamlPeriodSamlsource,sourcesSamlPeriodUsersamlsourceconnection,stagesAuthenticatorDuoPeriodAuthenticatorduostage,stagesAuthenticatorDuoPeriodDuodevice,stagesAuthenticatorSmsPeriodAuthenticatorsmsstage,stagesAuthenticatorSmsPeriodSmsdevice,stagesAuthenticatorStaticPeriodAuthenticatorstaticstage,stagesAuthenticatorStaticPeriodStaticdevice,stagesAuthenticatorTotpPeriodAuthenticatortotpstage,stagesAuthenticatorTotpPeriodTotpdevice,stagesAuthenticatorValidatePeriodAuthenticatorvalidatestage,stagesAuthenticatorWebauthnPeriodAuthenticatewebauthnstage,stagesAuthenticatorWebauthnPeriodWebauthndevice,stagesCaptchaPeriodCaptchastage,stagesConsentPeriodConsentstage,stagesConsentPeriodUserconsent,stagesDenyPeriodDenystage,stagesDummyPeriodDummystage,stagesEmailPeriodEmailstage,stagesIdentificationPeriodIdentificationstage,stagesInvitationPeriodInvitationstage,stagesInvitationPeriodInvitation,stagesPasswordPeriodPasswordstage,stagesPromptPeriodPrompt,stagesPromptPeriodPromptstage,stagesUserDeletePeriodUserdeletestage,stagesUserLoginPeriodUserloginstage,stagesUserLogoutPeriodUserlogoutstage,stagesUserWritePeriodUserwritestage,brandsPeriodBrand,blueprintsPeriodBlueprintinstance,corePeriodGroup,corePeriodUser,corePeriodApplication,corePeriodToken,enterprisePeriodLicense,providersRacPeriodRacprovider,providersRacPeriodEndpoint,providersRacPeriodRacpropertymapping,unknownDefaultOpenApi + * Values: tenantsPeriodDomain,cryptoPeriodCertificatekeypair,eventsPeriodEvent,eventsPeriodNotificationtransport,eventsPeriodNotification,eventsPeriodNotificationrule,eventsPeriodNotificationwebhookmapping,flowsPeriodFlow,flowsPeriodFlowstagebinding,outpostsPeriodDockerserviceconnection,outpostsPeriodKubernetesserviceconnection,outpostsPeriodOutpost,policiesDummyPeriodDummypolicy,policiesEventMatcherPeriodEventmatcherpolicy,policiesExpiryPeriodPasswordexpirypolicy,policiesExpressionPeriodExpressionpolicy,policiesPasswordPeriodPasswordpolicy,policiesReputationPeriodReputationpolicy,policiesPeriodPolicybinding,providersLdapPeriodLdapprovider,providersOauth2PeriodScopemapping,providersOauth2PeriodOauth2provider,providersProxyPeriodProxyprovider,providersRadiusPeriodRadiusprovider,providersSamlPeriodSamlprovider,providersSamlPeriodSamlpropertymapping,providersScimPeriodScimprovider,providersScimPeriodScimmapping,rbacPeriodRole,sourcesLdapPeriodLdapsource,sourcesLdapPeriodLdappropertymapping,sourcesOauthPeriodOauthsource,sourcesOauthPeriodUseroauthsourceconnection,sourcesPlexPeriodPlexsource,sourcesPlexPeriodPlexsourceconnection,sourcesSamlPeriodSamlsource,sourcesSamlPeriodUsersamlsourceconnection,stagesAuthenticatorDuoPeriodAuthenticatorduostage,stagesAuthenticatorDuoPeriodDuodevice,stagesAuthenticatorMobilePeriodAuthenticatormobilestage,stagesAuthenticatorMobilePeriodMobiledevice,stagesAuthenticatorSmsPeriodAuthenticatorsmsstage,stagesAuthenticatorSmsPeriodSmsdevice,stagesAuthenticatorStaticPeriodAuthenticatorstaticstage,stagesAuthenticatorStaticPeriodStaticdevice,stagesAuthenticatorTotpPeriodAuthenticatortotpstage,stagesAuthenticatorTotpPeriodTotpdevice,stagesAuthenticatorValidatePeriodAuthenticatorvalidatestage,stagesAuthenticatorWebauthnPeriodAuthenticatewebauthnstage,stagesAuthenticatorWebauthnPeriodWebauthndevice,stagesCaptchaPeriodCaptchastage,stagesConsentPeriodConsentstage,stagesConsentPeriodUserconsent,stagesDenyPeriodDenystage,stagesDummyPeriodDummystage,stagesEmailPeriodEmailstage,stagesIdentificationPeriodIdentificationstage,stagesInvitationPeriodInvitationstage,stagesInvitationPeriodInvitation,stagesPasswordPeriodPasswordstage,stagesPromptPeriodPrompt,stagesPromptPeriodPromptstage,stagesUserDeletePeriodUserdeletestage,stagesUserLoginPeriodUserloginstage,stagesUserLogoutPeriodUserlogoutstage,stagesUserWritePeriodUserwritestage,brandsPeriodBrand,blueprintsPeriodBlueprintinstance,corePeriodGroup,corePeriodUser,corePeriodApplication,corePeriodToken,enterprisePeriodLicense,providersRacPeriodRacprovider,providersRacPeriodEndpoint,providersRacPeriodRacpropertymapping,unknownDefaultOpenApi */ @JsonClass(generateAdapter = false) @@ -82,9 +82,6 @@ enum class ModelEnum(val value: kotlin.String) { @Json(name = "authentik_policies_reputation.reputationpolicy") policiesReputationPeriodReputationpolicy("authentik_policies_reputation.reputationpolicy"), - @Json(name = "authentik_policies_reputation.reputation") - policiesReputationPeriodReputation("authentik_policies_reputation.reputation"), - @Json(name = "authentik_policies.policybinding") policiesPeriodPolicybinding("authentik_policies.policybinding"), @@ -97,15 +94,6 @@ enum class ModelEnum(val value: kotlin.String) { @Json(name = "authentik_providers_oauth2.oauth2provider") providersOauth2PeriodOauth2provider("authentik_providers_oauth2.oauth2provider"), - @Json(name = "authentik_providers_oauth2.authorizationcode") - providersOauth2PeriodAuthorizationcode("authentik_providers_oauth2.authorizationcode"), - - @Json(name = "authentik_providers_oauth2.accesstoken") - providersOauth2PeriodAccesstoken("authentik_providers_oauth2.accesstoken"), - - @Json(name = "authentik_providers_oauth2.refreshtoken") - providersOauth2PeriodRefreshtoken("authentik_providers_oauth2.refreshtoken"), - @Json(name = "authentik_providers_proxy.proxyprovider") providersProxyPeriodProxyprovider("authentik_providers_proxy.proxyprovider"), @@ -157,6 +145,12 @@ enum class ModelEnum(val value: kotlin.String) { @Json(name = "authentik_stages_authenticator_duo.duodevice") stagesAuthenticatorDuoPeriodDuodevice("authentik_stages_authenticator_duo.duodevice"), + @Json(name = "authentik_stages_authenticator_mobile.authenticatormobilestage") + stagesAuthenticatorMobilePeriodAuthenticatormobilestage("authentik_stages_authenticator_mobile.authenticatormobilestage"), + + @Json(name = "authentik_stages_authenticator_mobile.mobiledevice") + stagesAuthenticatorMobilePeriodMobiledevice("authentik_stages_authenticator_mobile.mobiledevice"), + @Json(name = "authentik_stages_authenticator_sms.authenticatorsmsstage") stagesAuthenticatorSmsPeriodAuthenticatorsmsstage("authentik_stages_authenticator_sms.authenticatorsmsstage"), diff --git a/src/main/kotlin/io/goauthentik/api/models/PaginatedAuthenticatorMobileStageList.kt b/src/main/kotlin/io/goauthentik/api/models/PaginatedAuthenticatorMobileStageList.kt new file mode 100644 index 0000000..fd92ace --- /dev/null +++ b/src/main/kotlin/io/goauthentik/api/models/PaginatedAuthenticatorMobileStageList.kt @@ -0,0 +1,41 @@ +/** + * + * Please note: + * This class is auto generated by OpenAPI Generator (https://openapi-generator.tech). + * Do not edit this file manually. + * + */ + +@file:Suppress( + "ArrayInDataClass", + "EnumEntryName", + "RemoveRedundantQualifierName", + "UnusedImport" +) + +package io.goauthentik.api.models + +import io.goauthentik.api.models.AuthenticatorMobileStage +import io.goauthentik.api.models.Pagination + +import com.squareup.moshi.Json +import com.squareup.moshi.JsonClass + +/** + * + * + * @param pagination + * @param results + */ + + +data class PaginatedAuthenticatorMobileStageList ( + + @Json(name = "pagination") + val pagination: Pagination, + + @Json(name = "results") + val results: kotlin.collections.List + +) + diff --git a/src/main/kotlin/io/goauthentik/api/models/PaginatedMobileDeviceList.kt b/src/main/kotlin/io/goauthentik/api/models/PaginatedMobileDeviceList.kt new file mode 100644 index 0000000..28d352a --- /dev/null +++ b/src/main/kotlin/io/goauthentik/api/models/PaginatedMobileDeviceList.kt @@ -0,0 +1,41 @@ +/** + * + * Please note: + * This class is auto generated by OpenAPI Generator (https://openapi-generator.tech). + * Do not edit this file manually. + * + */ + +@file:Suppress( + "ArrayInDataClass", + "EnumEntryName", + "RemoveRedundantQualifierName", + "UnusedImport" +) + +package io.goauthentik.api.models + +import io.goauthentik.api.models.MobileDevice +import io.goauthentik.api.models.Pagination + +import com.squareup.moshi.Json +import com.squareup.moshi.JsonClass + +/** + * + * + * @param pagination + * @param results + */ + + +data class PaginatedMobileDeviceList ( + + @Json(name = "pagination") + val pagination: Pagination, + + @Json(name = "results") + val results: kotlin.collections.List + +) + diff --git a/src/main/kotlin/io/goauthentik/api/models/PaginatedSystemTaskList.kt b/src/main/kotlin/io/goauthentik/api/models/PaginatedSystemTaskList.kt new file mode 100644 index 0000000..b18d4c9 --- /dev/null +++ b/src/main/kotlin/io/goauthentik/api/models/PaginatedSystemTaskList.kt @@ -0,0 +1,41 @@ +/** + * + * Please note: + * This class is auto generated by OpenAPI Generator (https://openapi-generator.tech). + * Do not edit this file manually. + * + */ + +@file:Suppress( + "ArrayInDataClass", + "EnumEntryName", + "RemoveRedundantQualifierName", + "UnusedImport" +) + +package io.goauthentik.api.models + +import io.goauthentik.api.models.Pagination +import io.goauthentik.api.models.SystemTask + +import com.squareup.moshi.Json +import com.squareup.moshi.JsonClass + +/** + * + * + * @param pagination + * @param results + */ + + +data class PaginatedSystemTaskList ( + + @Json(name = "pagination") + val pagination: Pagination, + + @Json(name = "results") + val results: kotlin.collections.List + +) + diff --git a/src/main/kotlin/io/goauthentik/api/models/PatchedAuthenticatorMobileStageRequest.kt b/src/main/kotlin/io/goauthentik/api/models/PatchedAuthenticatorMobileStageRequest.kt new file mode 100644 index 0000000..dbff4fa --- /dev/null +++ b/src/main/kotlin/io/goauthentik/api/models/PatchedAuthenticatorMobileStageRequest.kt @@ -0,0 +1,58 @@ +/** + * + * Please note: + * This class is auto generated by OpenAPI Generator (https://openapi-generator.tech). + * Do not edit this file manually. + * + */ + +@file:Suppress( + "ArrayInDataClass", + "EnumEntryName", + "RemoveRedundantQualifierName", + "UnusedImport" +) + +package io.goauthentik.api.models + +import io.goauthentik.api.models.FlowSetRequest +import io.goauthentik.api.models.ItemMatchingModeEnum + +import com.squareup.moshi.Json +import com.squareup.moshi.JsonClass + +/** + * AuthenticatorMobileStage Serializer + * + * @param name + * @param flowSet + * @param configureFlow Flow used by an authenticated user to configure this Stage. If empty, user will not be able to configure this stage. + * @param friendlyName + * @param itemMatchingMode + * @param cgwEndpoint + */ + + +data class PatchedAuthenticatorMobileStageRequest ( + + @Json(name = "name") + val name: kotlin.String? = null, + + @Json(name = "flow_set") + val flowSet: kotlin.collections.List? = null, + + /* Flow used by an authenticated user to configure this Stage. If empty, user will not be able to configure this stage. */ + @Json(name = "configure_flow") + val configureFlow: java.util.UUID? = null, + + @Json(name = "friendly_name") + val friendlyName: kotlin.String? = null, + + @Json(name = "item_matching_mode") + val itemMatchingMode: ItemMatchingModeEnum? = null, + + @Json(name = "cgw_endpoint") + val cgwEndpoint: kotlin.String? = null + +) + diff --git a/src/main/kotlin/io/goauthentik/api/models/PatchedDuoDeviceRequest.kt b/src/main/kotlin/io/goauthentik/api/models/PatchedDuoDeviceRequest.kt index 6af8c50..08a6750 100644 --- a/src/main/kotlin/io/goauthentik/api/models/PatchedDuoDeviceRequest.kt +++ b/src/main/kotlin/io/goauthentik/api/models/PatchedDuoDeviceRequest.kt @@ -22,13 +22,16 @@ import com.squareup.moshi.JsonClass /** * Serializer for Duo authenticator devices * - * @param name The human-readable name of this device. + * @param pk + * @param name */ data class PatchedDuoDeviceRequest ( - /* The human-readable name of this device. */ + @Json(name = "pk") + val pk: kotlin.String? = null, + @Json(name = "name") val name: kotlin.String? = null diff --git a/src/main/kotlin/io/goauthentik/api/models/PatchedMobileDeviceRequest.kt b/src/main/kotlin/io/goauthentik/api/models/PatchedMobileDeviceRequest.kt new file mode 100644 index 0000000..a6cb601 --- /dev/null +++ b/src/main/kotlin/io/goauthentik/api/models/PatchedMobileDeviceRequest.kt @@ -0,0 +1,39 @@ +/** + * + * Please note: + * This class is auto generated by OpenAPI Generator (https://openapi-generator.tech). + * Do not edit this file manually. + * + */ + +@file:Suppress( + "ArrayInDataClass", + "EnumEntryName", + "RemoveRedundantQualifierName", + "UnusedImport" +) + +package io.goauthentik.api.models + + +import com.squareup.moshi.Json +import com.squareup.moshi.JsonClass + +/** + * Serializer for Mobile authenticator devices + * + * @param pk + * @param name + */ + + +data class PatchedMobileDeviceRequest ( + + @Json(name = "pk") + val pk: kotlin.String? = null, + + @Json(name = "name") + val name: kotlin.String? = null + +) + diff --git a/src/main/kotlin/io/goauthentik/api/models/PatchedSMSDeviceRequest.kt b/src/main/kotlin/io/goauthentik/api/models/PatchedSMSDeviceRequest.kt index d498e6d..18bbc34 100644 --- a/src/main/kotlin/io/goauthentik/api/models/PatchedSMSDeviceRequest.kt +++ b/src/main/kotlin/io/goauthentik/api/models/PatchedSMSDeviceRequest.kt @@ -22,13 +22,16 @@ import com.squareup.moshi.JsonClass /** * Serializer for sms authenticator devices * - * @param name The human-readable name of this device. + * @param pk + * @param name */ data class PatchedSMSDeviceRequest ( - /* The human-readable name of this device. */ + @Json(name = "pk") + val pk: kotlin.String? = null, + @Json(name = "name") val name: kotlin.String? = null diff --git a/src/main/kotlin/io/goauthentik/api/models/PatchedStaticDeviceRequest.kt b/src/main/kotlin/io/goauthentik/api/models/PatchedStaticDeviceRequest.kt index 904f4b3..ffee9b2 100644 --- a/src/main/kotlin/io/goauthentik/api/models/PatchedStaticDeviceRequest.kt +++ b/src/main/kotlin/io/goauthentik/api/models/PatchedStaticDeviceRequest.kt @@ -22,13 +22,16 @@ import com.squareup.moshi.JsonClass /** * Serializer for static authenticator devices * - * @param name The human-readable name of this device. + * @param pk + * @param name */ data class PatchedStaticDeviceRequest ( - /* The human-readable name of this device. */ + @Json(name = "pk") + val pk: kotlin.String? = null, + @Json(name = "name") val name: kotlin.String? = null diff --git a/src/main/kotlin/io/goauthentik/api/models/PatchedTOTPDeviceRequest.kt b/src/main/kotlin/io/goauthentik/api/models/PatchedTOTPDeviceRequest.kt index 683a1e0..552220b 100644 --- a/src/main/kotlin/io/goauthentik/api/models/PatchedTOTPDeviceRequest.kt +++ b/src/main/kotlin/io/goauthentik/api/models/PatchedTOTPDeviceRequest.kt @@ -22,13 +22,16 @@ import com.squareup.moshi.JsonClass /** * Serializer for totp authenticator devices * - * @param name The human-readable name of this device. + * @param pk + * @param name */ data class PatchedTOTPDeviceRequest ( - /* The human-readable name of this device. */ + @Json(name = "pk") + val pk: kotlin.String? = null, + @Json(name = "name") val name: kotlin.String? = null diff --git a/src/main/kotlin/io/goauthentik/api/models/PatchedWebAuthnDeviceRequest.kt b/src/main/kotlin/io/goauthentik/api/models/PatchedWebAuthnDeviceRequest.kt index 28e9ba8..58a20a6 100644 --- a/src/main/kotlin/io/goauthentik/api/models/PatchedWebAuthnDeviceRequest.kt +++ b/src/main/kotlin/io/goauthentik/api/models/PatchedWebAuthnDeviceRequest.kt @@ -22,12 +22,16 @@ import com.squareup.moshi.JsonClass /** * Serializer for WebAuthn authenticator devices * + * @param pk * @param name */ data class PatchedWebAuthnDeviceRequest ( + @Json(name = "pk") + val pk: kotlin.String? = null, + @Json(name = "name") val name: kotlin.String? = null diff --git a/src/main/kotlin/io/goauthentik/api/models/TaskStatusEnum.kt b/src/main/kotlin/io/goauthentik/api/models/PlatformEnum.kt similarity index 68% rename from src/main/kotlin/io/goauthentik/api/models/TaskStatusEnum.kt rename to src/main/kotlin/io/goauthentik/api/models/PlatformEnum.kt index f0e28b0..2ea5557 100644 --- a/src/main/kotlin/io/goauthentik/api/models/TaskStatusEnum.kt +++ b/src/main/kotlin/io/goauthentik/api/models/PlatformEnum.kt @@ -20,25 +20,22 @@ import com.squareup.moshi.Json import com.squareup.moshi.JsonClass /** - * * `SUCCESSFUL` - SUCCESSFUL * `WARNING` - WARNING * `ERROR` - ERROR * `UNKNOWN` - UNKNOWN + * * `ios` - iOS * `android` - Android * `other` - Other * - * Values: sUCCESSFUL,wARNING,eRROR,uNKNOWN,unknownDefaultOpenApi + * Values: ios,android,other,unknownDefaultOpenApi */ @JsonClass(generateAdapter = false) -enum class TaskStatusEnum(val value: kotlin.String) { +enum class PlatformEnum(val value: kotlin.String) { - @Json(name = "SUCCESSFUL") - sUCCESSFUL("SUCCESSFUL"), + @Json(name = "ios") + ios("ios"), - @Json(name = "WARNING") - wARNING("WARNING"), + @Json(name = "android") + android("android"), - @Json(name = "ERROR") - eRROR("ERROR"), - - @Json(name = "UNKNOWN") - uNKNOWN("UNKNOWN"), + @Json(name = "other") + other("other"), @Json(name = "unknown_default_open_api") unknownDefaultOpenApi("unknown_default_open_api"); @@ -56,12 +53,12 @@ enum class TaskStatusEnum(val value: kotlin.String) { /** * Converts the provided [data] to a [String] on success, null otherwise. */ - fun encode(data: kotlin.Any?): kotlin.String? = if (data is TaskStatusEnum) "$data" else null + fun encode(data: kotlin.Any?): kotlin.String? = if (data is PlatformEnum) "$data" else null /** - * Returns a valid [TaskStatusEnum] for [data], null otherwise. + * Returns a valid [PlatformEnum] for [data], null otherwise. */ - fun decode(data: kotlin.Any?): TaskStatusEnum? = data?.let { + fun decode(data: kotlin.Any?): PlatformEnum? = data?.let { val normalizedData = "$it".lowercase() values().firstOrNull { value -> it == value || normalizedData == "$value".lowercase() diff --git a/src/main/kotlin/io/goauthentik/api/models/SCIMSyncStatus.kt b/src/main/kotlin/io/goauthentik/api/models/SCIMSyncStatus.kt index c32c60c..0e8997f 100644 --- a/src/main/kotlin/io/goauthentik/api/models/SCIMSyncStatus.kt +++ b/src/main/kotlin/io/goauthentik/api/models/SCIMSyncStatus.kt @@ -15,7 +15,7 @@ package io.goauthentik.api.models -import io.goauthentik.api.models.Task +import io.goauthentik.api.models.SystemTask import com.squareup.moshi.Json import com.squareup.moshi.JsonClass @@ -34,7 +34,7 @@ data class SCIMSyncStatus ( val isRunning: kotlin.Boolean, @Json(name = "tasks") - val tasks: kotlin.collections.List + val tasks: kotlin.collections.List ) diff --git a/src/main/kotlin/io/goauthentik/api/models/SMSDevice.kt b/src/main/kotlin/io/goauthentik/api/models/SMSDevice.kt index e15c5b1..3536722 100644 --- a/src/main/kotlin/io/goauthentik/api/models/SMSDevice.kt +++ b/src/main/kotlin/io/goauthentik/api/models/SMSDevice.kt @@ -22,23 +22,42 @@ import com.squareup.moshi.JsonClass /** * Serializer for sms authenticator devices * - * @param name The human-readable name of this device. + * @param verboseName Return object's verbose_name + * @param verboseNamePlural Return object's plural verbose_name + * @param metaModelName Return internal model name * @param pk - * @param phoneNumber + * @param name + * @param type Get type of device + * @param confirmed */ data class SMSDevice ( - /* The human-readable name of this device. */ + /* Return object's verbose_name */ + @Json(name = "verbose_name") + val verboseName: kotlin.String, + + /* Return object's plural verbose_name */ + @Json(name = "verbose_name_plural") + val verboseNamePlural: kotlin.String, + + /* Return internal model name */ + @Json(name = "meta_model_name") + val metaModelName: kotlin.String, + + @Json(name = "pk") + val pk: kotlin.String, + @Json(name = "name") val name: kotlin.String, - @Json(name = "pk") - val pk: kotlin.Int, + /* Get type of device */ + @Json(name = "type") + val type: kotlin.String, - @Json(name = "phone_number") - val phoneNumber: kotlin.String + @Json(name = "confirmed") + val confirmed: kotlin.Boolean ) diff --git a/src/main/kotlin/io/goauthentik/api/models/SMSDeviceRequest.kt b/src/main/kotlin/io/goauthentik/api/models/SMSDeviceRequest.kt index 92abf6d..034fd33 100644 --- a/src/main/kotlin/io/goauthentik/api/models/SMSDeviceRequest.kt +++ b/src/main/kotlin/io/goauthentik/api/models/SMSDeviceRequest.kt @@ -22,13 +22,16 @@ import com.squareup.moshi.JsonClass /** * Serializer for sms authenticator devices * - * @param name The human-readable name of this device. + * @param pk + * @param name */ data class SMSDeviceRequest ( - /* The human-readable name of this device. */ + @Json(name = "pk") + val pk: kotlin.String, + @Json(name = "name") val name: kotlin.String diff --git a/src/main/kotlin/io/goauthentik/api/models/StaticDevice.kt b/src/main/kotlin/io/goauthentik/api/models/StaticDevice.kt index 854b497..02058b5 100644 --- a/src/main/kotlin/io/goauthentik/api/models/StaticDevice.kt +++ b/src/main/kotlin/io/goauthentik/api/models/StaticDevice.kt @@ -23,23 +23,46 @@ import com.squareup.moshi.JsonClass /** * Serializer for static authenticator devices * - * @param name The human-readable name of this device. - * @param tokenSet + * @param verboseName Return object's verbose_name + * @param verboseNamePlural Return object's plural verbose_name + * @param metaModelName Return internal model name * @param pk + * @param name + * @param type Get type of device + * @param confirmed + * @param tokenSet */ data class StaticDevice ( - /* The human-readable name of this device. */ + /* Return object's verbose_name */ + @Json(name = "verbose_name") + val verboseName: kotlin.String, + + /* Return object's plural verbose_name */ + @Json(name = "verbose_name_plural") + val verboseNamePlural: kotlin.String, + + /* Return internal model name */ + @Json(name = "meta_model_name") + val metaModelName: kotlin.String, + + @Json(name = "pk") + val pk: kotlin.String, + @Json(name = "name") val name: kotlin.String, - @Json(name = "token_set") - val tokenSet: kotlin.collections.List, + /* Get type of device */ + @Json(name = "type") + val type: kotlin.String, - @Json(name = "pk") - val pk: kotlin.Int + @Json(name = "confirmed") + val confirmed: kotlin.Boolean, + + @Json(name = "token_set") + val tokenSet: kotlin.collections.List ) diff --git a/src/main/kotlin/io/goauthentik/api/models/StaticDeviceRequest.kt b/src/main/kotlin/io/goauthentik/api/models/StaticDeviceRequest.kt index b1ac54c..b957ab4 100644 --- a/src/main/kotlin/io/goauthentik/api/models/StaticDeviceRequest.kt +++ b/src/main/kotlin/io/goauthentik/api/models/StaticDeviceRequest.kt @@ -22,13 +22,16 @@ import com.squareup.moshi.JsonClass /** * Serializer for static authenticator devices * - * @param name The human-readable name of this device. + * @param pk + * @param name */ data class StaticDeviceRequest ( - /* The human-readable name of this device. */ + @Json(name = "pk") + val pk: kotlin.String, + @Json(name = "name") val name: kotlin.String diff --git a/src/main/kotlin/io/goauthentik/api/models/SystemTask.kt b/src/main/kotlin/io/goauthentik/api/models/SystemTask.kt new file mode 100644 index 0000000..7725c59 --- /dev/null +++ b/src/main/kotlin/io/goauthentik/api/models/SystemTask.kt @@ -0,0 +1,73 @@ +/** + * + * Please note: + * This class is auto generated by OpenAPI Generator (https://openapi-generator.tech). + * Do not edit this file manually. + * + */ + +@file:Suppress( + "ArrayInDataClass", + "EnumEntryName", + "RemoveRedundantQualifierName", + "UnusedImport" +) + +package io.goauthentik.api.models + +import io.goauthentik.api.models.SystemTaskStatusEnum + +import com.squareup.moshi.Json +import com.squareup.moshi.JsonClass + +/** + * Serialize TaskInfo and TaskResult + * + * @param uuid + * @param name + * @param fullName Get full name with UID + * @param description + * @param startTimestamp + * @param finishTimestamp + * @param duration + * @param status + * @param messages + * @param uid + */ + + +data class SystemTask ( + + @Json(name = "uuid") + val uuid: java.util.UUID, + + @Json(name = "name") + val name: kotlin.String, + + /* Get full name with UID */ + @Json(name = "full_name") + val fullName: kotlin.String, + + @Json(name = "description") + val description: kotlin.String, + + @Json(name = "start_timestamp") + val startTimestamp: java.time.OffsetDateTime, + + @Json(name = "finish_timestamp") + val finishTimestamp: java.time.OffsetDateTime, + + @Json(name = "duration") + val duration: kotlin.Double, + + @Json(name = "status") + val status: SystemTaskStatusEnum, + + @Json(name = "messages") + val messages: kotlin.collections.List, + + @Json(name = "uid") + val uid: kotlin.String? = null + +) + diff --git a/src/main/kotlin/io/goauthentik/api/models/SystemTaskStatusEnum.kt b/src/main/kotlin/io/goauthentik/api/models/SystemTaskStatusEnum.kt new file mode 100644 index 0000000..db42b82 --- /dev/null +++ b/src/main/kotlin/io/goauthentik/api/models/SystemTaskStatusEnum.kt @@ -0,0 +1,72 @@ +/** + * + * Please note: + * This class is auto generated by OpenAPI Generator (https://openapi-generator.tech). + * Do not edit this file manually. + * + */ + +@file:Suppress( + "ArrayInDataClass", + "EnumEntryName", + "RemoveRedundantQualifierName", + "UnusedImport" +) + +package io.goauthentik.api.models + + +import com.squareup.moshi.Json +import com.squareup.moshi.JsonClass + +/** + * * `unknown` - UNKNOWN * `successful` - SUCCESSFUL * `warning` - WARNING * `error` - ERROR + * + * Values: unknown,successful,warning,error,unknownDefaultOpenApi + */ + +@JsonClass(generateAdapter = false) +enum class SystemTaskStatusEnum(val value: kotlin.String) { + + @Json(name = "unknown") + unknown("unknown"), + + @Json(name = "successful") + successful("successful"), + + @Json(name = "warning") + warning("warning"), + + @Json(name = "error") + error("error"), + + @Json(name = "unknown_default_open_api") + unknownDefaultOpenApi("unknown_default_open_api"); + + /** + * Override [toString()] to avoid using the enum variable name as the value, and instead use + * the actual value defined in the API spec file. + * + * This solves a problem when the variable name and its value are different, and ensures that + * the client sends the correct enum values to the server always. + */ + override fun toString(): kotlin.String = value + + companion object { + /** + * Converts the provided [data] to a [String] on success, null otherwise. + */ + fun encode(data: kotlin.Any?): kotlin.String? = if (data is SystemTaskStatusEnum) "$data" else null + + /** + * Returns a valid [SystemTaskStatusEnum] for [data], null otherwise. + */ + fun decode(data: kotlin.Any?): SystemTaskStatusEnum? = data?.let { + val normalizedData = "$it".lowercase() + values().firstOrNull { value -> + it == value || normalizedData == "$value".lowercase() + } + } + } +} + diff --git a/src/main/kotlin/io/goauthentik/api/models/TOTPDevice.kt b/src/main/kotlin/io/goauthentik/api/models/TOTPDevice.kt index 53ac72d..ad4f025 100644 --- a/src/main/kotlin/io/goauthentik/api/models/TOTPDevice.kt +++ b/src/main/kotlin/io/goauthentik/api/models/TOTPDevice.kt @@ -22,19 +22,42 @@ import com.squareup.moshi.JsonClass /** * Serializer for totp authenticator devices * - * @param name The human-readable name of this device. + * @param verboseName Return object's verbose_name + * @param verboseNamePlural Return object's plural verbose_name + * @param metaModelName Return internal model name * @param pk + * @param name + * @param type Get type of device + * @param confirmed */ data class TOTPDevice ( - /* The human-readable name of this device. */ + /* Return object's verbose_name */ + @Json(name = "verbose_name") + val verboseName: kotlin.String, + + /* Return object's plural verbose_name */ + @Json(name = "verbose_name_plural") + val verboseNamePlural: kotlin.String, + + /* Return internal model name */ + @Json(name = "meta_model_name") + val metaModelName: kotlin.String, + + @Json(name = "pk") + val pk: kotlin.String, + @Json(name = "name") val name: kotlin.String, - @Json(name = "pk") - val pk: kotlin.Int + /* Get type of device */ + @Json(name = "type") + val type: kotlin.String, + + @Json(name = "confirmed") + val confirmed: kotlin.Boolean ) diff --git a/src/main/kotlin/io/goauthentik/api/models/TOTPDeviceRequest.kt b/src/main/kotlin/io/goauthentik/api/models/TOTPDeviceRequest.kt index cb9f726..cd2fc94 100644 --- a/src/main/kotlin/io/goauthentik/api/models/TOTPDeviceRequest.kt +++ b/src/main/kotlin/io/goauthentik/api/models/TOTPDeviceRequest.kt @@ -22,13 +22,16 @@ import com.squareup.moshi.JsonClass /** * Serializer for totp authenticator devices * - * @param name The human-readable name of this device. + * @param pk + * @param name */ data class TOTPDeviceRequest ( - /* The human-readable name of this device. */ + @Json(name = "pk") + val pk: kotlin.String, + @Json(name = "name") val name: kotlin.String diff --git a/src/main/kotlin/io/goauthentik/api/models/Task.kt b/src/main/kotlin/io/goauthentik/api/models/Task.kt deleted file mode 100644 index dc30f8b..0000000 --- a/src/main/kotlin/io/goauthentik/api/models/Task.kt +++ /dev/null @@ -1,57 +0,0 @@ -/** - * - * Please note: - * This class is auto generated by OpenAPI Generator (https://openapi-generator.tech). - * Do not edit this file manually. - * - */ - -@file:Suppress( - "ArrayInDataClass", - "EnumEntryName", - "RemoveRedundantQualifierName", - "UnusedImport" -) - -package io.goauthentik.api.models - -import io.goauthentik.api.models.TaskStatusEnum - -import com.squareup.moshi.Json -import com.squareup.moshi.JsonClass - -/** - * Serialize TaskInfo and TaskResult - * - * @param taskName - * @param taskDescription - * @param taskFinishTimestamp - * @param taskDuration Get the duration a task took to run - * @param status - * @param messages - */ - - -data class Task ( - - @Json(name = "task_name") - val taskName: kotlin.String, - - @Json(name = "task_description") - val taskDescription: kotlin.String, - - @Json(name = "task_finish_timestamp") - val taskFinishTimestamp: java.time.OffsetDateTime, - - /* Get the duration a task took to run */ - @Json(name = "task_duration") - val taskDuration: kotlin.Int, - - @Json(name = "status") - val status: TaskStatusEnum, - - @Json(name = "messages") - val messages: kotlin.collections.List - -) - diff --git a/src/main/kotlin/io/goauthentik/api/models/UsedByActionEnum.kt b/src/main/kotlin/io/goauthentik/api/models/UsedByActionEnum.kt index 6a15a1b..3712eaa 100644 --- a/src/main/kotlin/io/goauthentik/api/models/UsedByActionEnum.kt +++ b/src/main/kotlin/io/goauthentik/api/models/UsedByActionEnum.kt @@ -20,25 +20,25 @@ import com.squareup.moshi.Json import com.squareup.moshi.JsonClass /** - * * `CASCADE` - CASCADE * `CASCADE_MANY` - CASCADE_MANY * `SET_NULL` - SET_NULL * `SET_DEFAULT` - SET_DEFAULT + * * `cascade` - CASCADE * `cascade_many` - CASCADE_MANY * `set_null` - SET_NULL * `set_default` - SET_DEFAULT * - * Values: cASCADE,cASCADEMANY,sETNULL,sETDEFAULT,unknownDefaultOpenApi + * Values: cascade,cascadeMany,setNull,setDefault,unknownDefaultOpenApi */ @JsonClass(generateAdapter = false) enum class UsedByActionEnum(val value: kotlin.String) { - @Json(name = "CASCADE") - cASCADE("CASCADE"), + @Json(name = "cascade") + cascade("cascade"), - @Json(name = "CASCADE_MANY") - cASCADEMANY("CASCADE_MANY"), + @Json(name = "cascade_many") + cascadeMany("cascade_many"), - @Json(name = "SET_NULL") - sETNULL("SET_NULL"), + @Json(name = "set_null") + setNull("set_null"), - @Json(name = "SET_DEFAULT") - sETDEFAULT("SET_DEFAULT"), + @Json(name = "set_default") + setDefault("set_default"), @Json(name = "unknown_default_open_api") unknownDefaultOpenApi("unknown_default_open_api"); diff --git a/src/main/kotlin/io/goauthentik/api/models/User.kt b/src/main/kotlin/io/goauthentik/api/models/User.kt index d7b12fb..7051812 100644 --- a/src/main/kotlin/io/goauthentik/api/models/User.kt +++ b/src/main/kotlin/io/goauthentik/api/models/User.kt @@ -29,7 +29,7 @@ import com.squareup.moshi.JsonClass * @param name User's display name. * @param isSuperuser * @param groupsObj - * @param avatar + * @param avatar User's avatar, either a http/https URL or a data URI * @param uid * @param uuid * @param isActive Designates whether this user should be treated as active. Unselect this instead of deleting accounts. @@ -60,6 +60,7 @@ data class User ( @Json(name = "groups_obj") val groupsObj: kotlin.collections.List, + /* User's avatar, either a http/https URL or a data URI */ @Json(name = "avatar") val avatar: kotlin.String, diff --git a/src/main/kotlin/io/goauthentik/api/models/UserSelf.kt b/src/main/kotlin/io/goauthentik/api/models/UserSelf.kt index 48693ff..0f26374 100644 --- a/src/main/kotlin/io/goauthentik/api/models/UserSelf.kt +++ b/src/main/kotlin/io/goauthentik/api/models/UserSelf.kt @@ -30,7 +30,7 @@ import com.squareup.moshi.JsonClass * @param isActive Designates whether this user should be treated as active. Unselect this instead of deleting accounts. * @param isSuperuser * @param groups - * @param avatar + * @param avatar User's avatar, either a http/https URL or a data URI * @param uid * @param settings Get user settings with brand and group settings applied * @param systemPermissions Get all system permissions assigned to the user @@ -62,6 +62,7 @@ data class UserSelf ( @Json(name = "groups") val groups: kotlin.collections.List, + /* User's avatar, either a http/https URL or a data URI */ @Json(name = "avatar") val avatar: kotlin.String, diff --git a/src/main/kotlin/io/goauthentik/api/models/WebAuthnDevice.kt b/src/main/kotlin/io/goauthentik/api/models/WebAuthnDevice.kt index 1c976ee..7cc05f2 100644 --- a/src/main/kotlin/io/goauthentik/api/models/WebAuthnDevice.kt +++ b/src/main/kotlin/io/goauthentik/api/models/WebAuthnDevice.kt @@ -22,22 +22,42 @@ import com.squareup.moshi.JsonClass /** * Serializer for WebAuthn authenticator devices * + * @param verboseName Return object's verbose_name + * @param verboseNamePlural Return object's plural verbose_name + * @param metaModelName Return internal model name * @param pk * @param name - * @param createdOn + * @param type Get type of device + * @param confirmed */ data class WebAuthnDevice ( + /* Return object's verbose_name */ + @Json(name = "verbose_name") + val verboseName: kotlin.String, + + /* Return object's plural verbose_name */ + @Json(name = "verbose_name_plural") + val verboseNamePlural: kotlin.String, + + /* Return internal model name */ + @Json(name = "meta_model_name") + val metaModelName: kotlin.String, + @Json(name = "pk") - val pk: kotlin.Int, + val pk: kotlin.String, @Json(name = "name") val name: kotlin.String, - @Json(name = "created_on") - val createdOn: java.time.OffsetDateTime + /* Get type of device */ + @Json(name = "type") + val type: kotlin.String, + + @Json(name = "confirmed") + val confirmed: kotlin.Boolean ) diff --git a/src/main/kotlin/io/goauthentik/api/models/WebAuthnDeviceRequest.kt b/src/main/kotlin/io/goauthentik/api/models/WebAuthnDeviceRequest.kt index 38ac5ad..64bb630 100644 --- a/src/main/kotlin/io/goauthentik/api/models/WebAuthnDeviceRequest.kt +++ b/src/main/kotlin/io/goauthentik/api/models/WebAuthnDeviceRequest.kt @@ -22,12 +22,16 @@ import com.squareup.moshi.JsonClass /** * Serializer for WebAuthn authenticator devices * + * @param pk * @param name */ data class WebAuthnDeviceRequest ( + @Json(name = "pk") + val pk: kotlin.String, + @Json(name = "name") val name: kotlin.String